...
首页> 外文期刊>Designs, Codes and Crytography >Cryptanalysis of multilinear maps from ideal lattices: revisited
【24h】

Cryptanalysis of multilinear maps from ideal lattices: revisited

机译:从理想晶格进行多线性映射的密码分析:再探讨

获取原文
获取原文并翻译 | 示例
           

摘要

Multilinear map is a central primitive in cryptography and Garg, Gentry and Halevi proposed the first approximate multilinear maps over ideal lattices (GGH13 map) at EUROCRYPT 2013. Ever since then, multilinear maps has caused the extensive concern and has found too numerous applications to name. Very recently, Hu and Jia put forward an efficient attack on the multipartite key exchange and witness encryption based on GGH13 map. In this paper, we describe another efficient cryptanalysis of GGH13 map, an augmented version of Hu and Jia's attack on it. More specifically, we improve their attacking tools and propose a "downgrading" method, which enable us to get a low level encoding from a higher level encoding. As a result, we can break the multilinear computational Diffie-Hellman assumption in the GGH13 setting with great ease while Hu and Jia only dealt with the decisional version. Furthermore, by applying our augmented cryptanalysis straightforwardly, we break two schemes from GGH13 map published at CRYPTO 2013: attribute-based encryption for general circuits and identity-based aggregate signatures.
机译:多线性映射是密码学的中心原语,Garg,Gentry和Halevi在EUROCRYPT 2013上提出了第一个理想晶格上的近似多线性映射(GGH13图)。从那时起,多线性映射引起了广泛的关注,并且发现了太多的应用。最近,胡和贾对基于GGH13映射的多方密钥交换和见证加密提出了有效的攻击。在本文中,我们描述了GGH13映射的另一种有效密码分析,这是胡和贾对其攻击的增强版。更具体地说,我们改进了他们的攻击工具,并提出了“降级”方法,该方法使我们能够从较高级别的编码中获取较低级别的编码。结果,我们可以很轻松地打破GGH13设置中的多线性计算Diffie-Hellman假设,而Hu和Jia仅处理决策版本。此外,通过直接应用我们的增强密码分析,我们从CRYPTO 2013上发布的GGH13映射中打破了两种方案:通用电路的基于属性的加密和基于身份的聚合签名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号