Cryptography Reference
In-Depth Information
α
r
sk
H
(
m
)(
mod q
).
This relation reveals nothing about
α
when k is chosen truly at random in
Z q ,but
when some bits of k are known, some information about
α
is leaked since all other
parameters are publicly known. Intuitively, knowing
bits of k should reveal
bits
of information about
α
,soif q is N bits long,
α
should be recoverable from about
N
/
faulty signatures. Moreover, the relation is affine in both
α
and k : that is why
we can hope to attack the problem with lattices.
Let us describe in more details how one can take advantage of the leaked infor-
mation. In our case, we know that the
least significant bits of k are 0, so we can
2 b for some integer b
write k
=
0. Writing h
=
H
(
m
)
, we get
2 s 1
2 s 1
α
r
·
b
h
·
(
mod q
).
Now let
2 s 1
2 s 1
t
=
r
·
q
and
u
=−
h
·
q
q denotes the only integer 0
<
(
)
where for any integer z ,
z
a
q such that a
z
mod q
.
Both t and u can be computed from public information, and the additional informa-
tion we have, namely that b
2 , can be expressed in terms of t and u as
<
q
/
2 .
0
α
t
u
q <
q
/
Therefore, if we denote by
|·| q the distance to q
Z
, i.e.
|
z
| q =
min a ∈Z |
z
aq
|
,we
have
2 + 1
2 + 1
| α
t
u
q
/
| q
q
/
.
In other words, we know an approximation of
α
t modulo q :
2 + 1
2 + 1
| α
t
v
/
| q
q
/
where v is the integer 2 + 1 u
q .
Given a number of faulty signatures
+
(
r i ,
s i )
of various messages m i ,say d of
them, the same method yields pairs of integers
(
t i ,
v i )
such that
2 + 1
2 + 1
| α
t i
v i /
| q
q
/
.
The goal is to recover
from this data. This problem is very similar to the hidden
number problem considered by Boneh and Venkatesan in [58], and is approached by
transforming it into a lattice closest vector problem.
More precisely, consider the
α
(
+
)
d
1
-dimensional lattice L spanned by the rows
of the following matrix:
Search WWH ::




Custom Search