zbmath.org

Document Zbl 1127.94014 - zbMATH Open

Examples

Geometry Search for the term Geometry in any field. Queries are case-independent.

Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.

"Topological group" Phrases (multi-words) should be set in "straight quotation marks".

au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.

so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.

dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.

la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Fields

any anywhere
an internal document identifier
au author, editor
ai internal author identifier
ti title
la language
so source
ab review, abstract
py publication year
rv reviewer
cc MSC code
ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)

Operators

a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses

See also our General Help.

New chosen-ciphertext attacks on NTR. (English) Zbl 1127.94014

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 89-106 (2007).

Summary: We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previously published at CRYPTO ’00 [É. Jaulmes and A. Joux, Adv. Cryptology – CRYPTO 2000, Lect. Notes Comput. Sci. 1880, 20–35 (2000; Zbl 0995.94525)] and CRYPTO ’03 [N. Howgrave-Graham et al., Lect. Notes Comput. Sci. 2729, 226–246 (2003; Zbl 1122.94377)]. Namely, the attacks only work in the presence of decryption failures; we only submit valid ciphertexts to the decryption oracle, where the plaintexts are chosen uniformly at random; and the number of oracle queries is small. Interestingly, our attacks can also be interpreted from a provable security point of view: in practice, if one had access to a NTRUencrypt decryption oracle such that the parameter set allows decryption failures, then one could recover the secret key. For instance, for the initial NTRU-1998 parameter sets, the output of the decryption oracle on a single decryption failure is enough to recover the secret key.
For the entire collection see [Zbl 1116.94001].


MSC: