Back to Search
Start Over
Lattice attacks on pairing-based signatures.
- Source :
-
Information Security Journal: A Global Perspective . 2024, Vol. 33 Issue 2, p138-157. 20p. - Publication Year :
- 2024
-
Abstract
- Practical implementations of cryptosystems often suffer from critical information leakage through side-channels (such as their power consumption or their electromagnetic emanations). For public-key cryptography on embedded systems, the core operation is usually group exponentiation – or scalar multiplication on elliptic curves – which is a sequence of group operations derived from the private-key that may reveal secret bits to an attacker (on an unprotected implementation). We present lattice-based polynomial-time (heuristic) algorithms that recover the signer's secret in popular pairing-based signatures when used to sign several messages under the assumption that blocks of consecutive bits of the corresponding exponents are known by the attacker. Our techniques rely upon Coppersmith's method and apply to many signatures in the so-called exponent-inversion framework in the standard security model (i.e. Boneh-Boyen, Gentry and Pontcheval-Sanders signatures) as well as in the random oracle model (i.e. Sakai-Kasahara signatures). [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 19393555
- Volume :
- 33
- Issue :
- 2
- Database :
- Academic Search Index
- Journal :
- Information Security Journal: A Global Perspective
- Publication Type :
- Academic Journal
- Accession number :
- 174878277
- Full Text :
- https://doi.org/10.1080/19393555.2023.2251476