We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as postquantum cryptography. They gave two parameter sets PS1 (n,p,deg X,q) = (80,3,1,921601) and PS2 (n,p,deg X,q) = (80,3,2,58982400019). The paper gives practical key-recovery and message-recovery attacks against those parameter sets of IEC through lattice basis-reduction algorithms. We exploit the fact that n = 80 is composite and adopt the idea of Gentry\u27s attack against NTRU-Composite (EUROCRYPT2001) to this setting. The summary of our attacks follows: * On PS1, we recover 84 private keys from 100 public keys in 30–40 seconds per key. * On PS1, w...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
The KpqC competition has begun in 2022, that aims to standardize Post-Quantum Cryptography (PQC) in ...
We describe public key encryption schemes with security provably based on the worst case hardness of...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
Akiyama, Goto, Okumura, Takagi, Nuida and Hanaoka introduced an indeterminate equation analogue of l...
In 2017, Liu, Li, Kim and Nepal submitted a new public-key encryption scheme Compact-LWE to NIST as...
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) ...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
Abstract. We describe public key encryption schemes with security provably based on the worst case h...
We present an efficient key recovery attack on code based encryption schemes using some quasi–dyadic...
In 2022, NIST selected Kyber and Dilithium as post-quantum cryptographic standard algorithms. The Nu...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
The KpqC competition has begun in 2022, that aims to standardize Post-Quantum Cryptography (PQC) in ...
We describe public key encryption schemes with security provably based on the worst case hardness of...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a pr...
Akiyama, Goto, Okumura, Takagi, Nuida and Hanaoka introduced an indeterminate equation analogue of l...
In 2017, Liu, Li, Kim and Nepal submitted a new public-key encryption scheme Compact-LWE to NIST as...
In [AJPS17], Aggarwal, Joux, Prakash & Santha described an elegant public-key cryptosystem (AJPS-1) ...
CRYSTALS-Kyber is a key-encapsulation mechanism, whose security is based on the hardness of solving ...
© International Association for Cryptologic Research 2019. In this paper we investigate the impact o...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
QcBits is a code-based public key algorithm based on a problem thought to be resistant to quantum co...
Abstract. We describe public key encryption schemes with security provably based on the worst case h...
We present an efficient key recovery attack on code based encryption schemes using some quasi–dyadic...
In 2022, NIST selected Kyber and Dilithium as post-quantum cryptographic standard algorithms. The Nu...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great ...
The KpqC competition has begun in 2022, that aims to standardize Post-Quantum Cryptography (PQC) in ...
We describe public key encryption schemes with security provably based on the worst case hardness of...