Cryptography Reference
In-Depth Information
de =
i for which σ i = 1. More precisely, if we let J σ
supp ( σ )=
{
i : σ i =1
}
,then
we choose K + k + l positions among [1
J σ to form I . The point of this
choice is that we have more chances to have a smaller size for I
···
N ]
\
= I
J .Let
de =
n
I |
|
,wehavenow:
n
−|
J σ |
n |
E {
J σ }
=
( k + K + l )
(8)
N
−|
J σ |
n/ 2
I |}
n |
E {|
=
E { E {
J σ }} ≈
n/ 2) ( k + K + l ) .
(9)
( N
The last approximation follows from the fact that the weight
is quite con-
centrated around n/ 2. The same reasoning can be made as before, but the odds
that the algorithm finds other valid signatures are much higher. This comes from
the fact that the expectation
|
σ
|
I |
is half the expected size of I in the previous
|
|
I |
k
R
ρ , whereas now
case as given in Equation (3). Previously we had
E
we have:
|
I |
k
R
2 ρ .
In other words, in order to avoid the previous attack we had to take ρ significantly
smaller than R and now, we have to take ρ significantly smaller than R/ 2.
For all the parameters proposed in the past, it turns out that d GV (
E
I |
,k )is
almost always equal to 1, which makes the attack generally successful in just
one iteration by choosing p =1.
Moreover, if another valid signature σ is obtained and by taking the union
J σ
|
J σ of the supports, then about 3 / 4ofthepositionsof J will be revealed. We
can start again the process of finding other message/signature pairs by choosing
K + k + l positions among
J σ )toformthesets I .This
approach can be iterated as explained in Algorithm 2. This process will quickly
reveal the whole set J and from this, the private key is easily extracted as detailed
in [COV07].
Finally, let us focus on the variant proposed in [BMJ11]. In this case, we have
slightly less information than in the original KKS scheme. This can be explained
by the following reasoning. In this case too, we choose S again as [1
{
1 , 2 ,...,N
}\
( J σ
···
N ]
\
J σ ,
de =
where as before J σ is defined as J σ
{
i : σ i =1
}
. However this time, by
defining n again as n de =
I |
|
,wehave
J σ |
|
n |
E {
J σ }
( k + K + l )
=
N
−|
J σ |
where
J σ = J
J σ .
However, this time due to the noise which is added,
\
|
J σ |
is expected to be larger
2 + ( N−n ) n
than before (namely of order
).
N
 
Search WWH ::




Custom Search