On the Security of the Schnorr Scheme using Preprocessing

نویسنده

  • Peter de Rooij
چکیده

In this paper, it is shorn that the Schnorr scheme with preprocessing BE proposed in I41 leaks too much information. An attack based on this information leakage is presented that retrieves the secret key. The complexity of this attack is upper bounded by 2k. b3(d-2) steps, and the expected required number of signatures is lees than Zk: .(j)"-', where k is a security parameter. This complexity is significantly lower than the kk(d-a] stepa, conjectured in [4]. For example, for the security parameters that are proposed in [4], the secret key c a n on average be found in Z37.6 steps, instead of in ZTZ steps, This showlr that it is inevitable to either modify the preproceising algorithm, or choose the values of the security paremeters larger than proposed in [4]. Finally, we briefly discuar the poreibility of averting the proposed attack by modifying the preprocessing algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-mor...

متن کامل

On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks

In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into account side channel attacks such as tampering or fault-injection attacks, Bellare and Kohno (Eurocrypt 2003) formalized related-key attacks (RKA), where stronger adversaries are considered. I...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Ekiti State Social Security Scheme (ESSSS) and its Effect on Food Security in Ekiti State, Nigeria

This study was carried out to evaluate the Ekiti State Social Security Scheme (ESSSS) in Nigeria. Specifically, the study estimated the food security status of the beneficiaries and non beneficiaries of the scheme, assessed the effect of the social security scheme on households’ food security status, and identified the constraints to the implementation of the scheme in the state. A three stage ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1991