Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384758
|View full text |Cite
|
Sign up to set email alerts
|

ModFalcon: Compact Signatures Based On Module-NTRU Lattices

Abstract: Lattices lead to promising practical post-quantum digital signatures, combining asymptotic efficiency with strong theoretical security guarantees. However, tuning their parameters into practical instantiations is a delicate task. On the one hand, NIST round 2 candidates based on Lyubashevsky's design (such as DILITHIUM and qTESLA) allow several tradeoffs between security and efficiency, but at the expense of a large bandwidth consumption. On the other hand, the hash-and-sign Falcon signature is much more compa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 38 publications
0
18
0
Order By: Relevance
“…Furthermore, the structure of the algorithms allows time-memory tradeoff and batch CVP oracle to be used. We believe that this algorithm has been in the folklore for some time, and it is somehow hinted at in ModFalcon's security analysis [9,Subsection 4.2], but without analysis of the heuristics introduced.…”
Section: Thomas Espitau and Paul Kirchnermentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the structure of the algorithms allows time-memory tradeoff and batch CVP oracle to be used. We believe that this algorithm has been in the folklore for some time, and it is somehow hinted at in ModFalcon's security analysis [9,Subsection 4.2], but without analysis of the heuristics introduced.…”
Section: Thomas Espitau and Paul Kirchnermentioning
confidence: 99%
“…In the so-called GPV framework [18], instantiated in the DLP cryptosystem [14] and its follow-ups FALCON [16], MODFALCON [9], a valid signature is a point close to a target, which is the hash of the message. Hence, forging a signature boils down to finding a close vector to a random target.…”
Section: Cryptographic Perspectivesmentioning
confidence: 99%
“…In the so-called GPV framework [18], instantiated in the DLP cryptosystem [14] and its followups Falcon [16], ModFalcon [9], a valid signature is a point close to a target, which is the hash of the message. Hence, forging a signature boils down to finding a close vector to a random target.…”
Section: Cryptographic Perspectivesmentioning
confidence: 99%
“…We believe that this algorithm has been in the folklore for some time, and it is somehow hinted in ModFalcon's security analysis [9,Subsection 4.2], but without analysis of the heuristics introduced.…”
Section: Introductionmentioning
confidence: 99%
“…It is thus crucial for security to prove that signatures are sampled according to a distribution that is statistically independent of the trapdoor. The first approach to do so, which remains the state of the art, 8 is due to Gentry, Peikert and Vaikuntanathan (GPV) [19]: sample the ApproxCVP solution according to a discrete Gaussian distribution centered at the target point and supported over the lattice, with covariance independent from the trapdoor (usually spherical). This type of lattice discrete Gaussian sampling can be carried out by randomizing known deterministic algorithms for ApproxCVP, like Babai rounding and Babai's nearest plane algorithm.…”
Section: Introductionmentioning
confidence: 99%