Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS’15

Zhen Liu,Yanbin Pan, Jinwei Zheng

Journal of Systems Science and Complexity(2024)

引用 0|浏览0
暂无评分
摘要
In ASIACCS 2015, Nuñez, et al. proposed a proxy re-encryption scheme, named NTRUReEncrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator’s public key into a re-encrypted ciphertext that can be decrypted correctly by delegatee’s private key. Because of the potential resistance to quantum algorithm, high efficiency and various applications in real life, NTRUReEncrypt has drawn lots of attention and its security has been widely discussed and analyzed. In PQCrypto2019, Liu, et al. proposed two key recovery attacks against it. However, their first attack heavily relies on a weaken decryption oracle, and the second attack needs to collect about 260 ciphertexts from the same message by theoretical analysis, which makes both of the attacks unrealistic. In this paper, inspired by the broadcast attack against NTRU, the authors find out that for NTRUReEncrypt the delegator and the delegatee can efficiently recover each other’s private key in polynomial time without any unrealistic assumptions. In addition, the authors also show how to fix NTRUReEncrypt to resist the proposed attacks. As a by-product, the authors also show how to commit broadcast attacks against NTRU 2001 with even dg, which was thought infeasible before.
更多
查看译文
关键词
Broadcast attack,key recovery,NTRU,NTRUReEncrypt
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要