Skip to main content
Top

2020 | OriginalPaper | Chapter

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors

Authors : Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang

Published in: Public-Key Cryptography – PKC 2020

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We describe a digital signature scheme \(\mathsf {MPSign}\), whose security relies on the conjectured hardness of the Polynomial Learning With Errors problem (\(\mathsf {PLWE}\)) for at least one defining polynomial within an exponential-size family (as a function of the security parameter). The proposed signature scheme follows the Fiat-Shamir framework and can be viewed as the Learning With Errors counterpart of the signature scheme described by Lyubashevsky at Asiacrypt 2016, whose security relies on the conjectured hardness of the Polynomial Short Integer Solution (\(\mathsf {PSIS}\)) problem for at least one defining polynomial within an exponential-size family. As opposed to the latter, \(\mathsf {MPSign}\) enjoys a security proof from \(\mathsf {PLWE}\) that is tight in the quantum-access random oracle model.
The main ingredient is a reduction from \(\mathsf {PLWE}\) for an arbitrary defining polynomial among exponentially many, to a variant of the Middle-Product Learning with Errors problem (\(\mathsf {MPLWE}\)) that allows for secrets that are small compared to the working modulus. We present concrete parameters for \(\mathsf {MPSign}\) using such small secrets, and show that they lead to significant savings in signature length over Lyubashevsky’s Asiacrypt 2016 scheme (which uses larger secrets) at typical security levels. As an additional small contribution, and in contrast to \(\mathsf {MPSign}\) (or \(\mathsf {MPLWE}\)), we present an efficient key-recovery attack against Lyubashevsky’s scheme (or the inhomogeneous \(\mathsf {PSIS}\) problem), when it is used with sufficiently small secrets, showing the necessity of a lower bound on secret size for the security of that scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[ACF+15a]
go back to reference Albrecht, M.R., Cid, C., Faugère, J.-C., Fitzpatrick, R., Perret, L.: Algebraic algorithms for LWE problems. ACM Commun. Comput. Algebra 49(2), 62 (2015)CrossRef Albrecht, M.R., Cid, C., Faugère, J.-C., Fitzpatrick, R., Perret, L.: Algebraic algorithms for LWE problems. ACM Commun. Comput. Algebra 49(2), 62 (2015)CrossRef
[ADPS16]
go back to reference Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: USENIX, pp. 327–343 (2016) Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: USENIX, pp. 327–343 (2016)
[APS15]
[BAA+19]
go back to reference Bindel, N., et al.: qTESLA: algorithm specifications and supporting documentation. NIST PQC round 2 submission document (2019) Bindel, N., et al.: qTESLA: algorithm specifications and supporting documentation. NIST PQC round 2 submission document (2019)
[BDK+19]
go back to reference Bos, J.W., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: Euro S P, pp. 353–367 (2019) Bos, J.W., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: Euro S P, pp. 353–367 (2019)
[DKL+18]
go back to reference Ducas, L., et al.: CRYSTALS - Dilithium: digital signatures from module lattices. In: CHES, pp. 238–268 (2018) Ducas, L., et al.: CRYSTALS - Dilithium: digital signatures from module lattices. In: CHES, pp. 238–268 (2018)
[LPR13]
go back to reference Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM 60(6), 43:1–43:35 (2013)MathSciNetCrossRef Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM 60(6), 43:1–43:35 (2013)MathSciNetCrossRef
[MR04]
go back to reference Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. In: FOCS, pp. 372–381. IEEE (2004) Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. In: FOCS, pp. 372–381. IEEE (2004)
[PFH+19]
go back to reference Prest, T., et al.: Falcon: algorithm specifications and supporting documentation. NIST PQC round 2 submission document (2019) Prest, T., et al.: Falcon: algorithm specifications and supporting documentation. NIST PQC round 2 submission document (2019)
[PRS17]
go back to reference Peikert, C., Regev, O., Stephens-Davidowitz, N.: Pseudorandomness of ring-LWE for any ring and modulus. In: STOC, pp. 461–473. ACM (2017) Peikert, C., Regev, O., Stephens-Davidowitz, N.: Pseudorandomness of ring-LWE for any ring and modulus. In: STOC, pp. 461–473. ACM (2017)
[SSZ17]
go back to reference Steinfeld, R., Sakzad, A., Zhao, R.K.: Titanium: proposal for a NIST post-quantum public-key encryption and KEM standard (2017) Steinfeld, R., Sakzad, A., Zhao, R.K.: Titanium: proposal for a NIST post-quantum public-key encryption and KEM standard (2017)
[SSZ19]
go back to reference Steinfeld, R., Sakzad, A., Zhao, R.K.: Practical MP-LWE-based encryption balancing security-risk versus efficiency. Des. Codes Crypt. 87(12), 2847–2884 (2019)MathSciNetCrossRef Steinfeld, R., Sakzad, A., Zhao, R.K.: Practical MP-LWE-based encryption balancing security-risk versus efficiency. Des. Codes Crypt. 87(12), 2847–2884 (2019)MathSciNetCrossRef
Metadata
Title
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Authors
Shi Bai
Dipayan Das
Ryo Hiromasa
Miruna Rosca
Amin Sakzad
Damien Stehlé
Ron Steinfeld
Zhenfei Zhang
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-45388-6_3

Premium Partner