2019
DOI: 10.1007/978-3-030-35199-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Key Recovery Attacks on Some Rank Metric Code-Based Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…We will revisit the core concept of the LTP second attack proposed in [14] . This attack capitalizes on two aspects of the design of Schnorr-type signature schemes: The determination of whether a generated signature with a low rank inadvertently reveals any information about an extended support linked to the secret key.…”
Section: A New Approach To Recover Secret Keys Of the Durandal Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…We will revisit the core concept of the LTP second attack proposed in [14] . This attack capitalizes on two aspects of the design of Schnorr-type signature schemes: The determination of whether a generated signature with a low rank inadvertently reveals any information about an extended support linked to the secret key.…”
Section: A New Approach To Recover Secret Keys Of the Durandal Frameworkmentioning
confidence: 99%
“…However, the RQCS signature scheme was successfully cryptanalyzed in [1] . Later on, generalization was made by Lau et al on the attack vector of SHMW signature scheme [1] , where the authors proposed two generic attacks (i.e., referred to as “LTP attacks”) on Schnorr-type rank metric signature schemes [14] . To be more precise, in LTP attacks, the objective is to derive either a basis for the original support of the secret key or a basis for extended support of the secret key based on the available signatures.…”
Section: Introductionmentioning
confidence: 99%
“…In 2018, Bellini et al [8] proposed the rank metric version of the Veron and CVE identification protocols and DSS. However, Lau et al [9] showed that the rank Veron was insecure, as its secret key could be recovered in polynomial time. Nevertheless, Bellini et al [10] improved the rank Veron DSS and proposed another scheme, namely the RVDC identification protocol and DSS.…”
Section: Introduction 1literature Reviewmentioning
confidence: 99%