Abuses of Ajtai-Dwork Cryptosystem
نویسنده
چکیده
Ajtai and Dwork 2] have recently introduced a probabilistic public-key en-cryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. Their encryption method may cause decrytion errors, though with small probability. Goldre-ich, Goldwasser, and Halevi 7] later modiied the encryption method of Ajtai and Dwork and made Ajtai-Dwork cryptosystem error-free. In this paper, we demonstrate how (improved) Ajtai-Dwork cryptosystem can be abused. Using this kind of abuses, users can communicate secrets in a key escrowed Ajtai-Dwork cryptosystem without fearing that their secrets will be revealed later by reconstructing their escrowed private-keys. However, we will also show that users have to trust their implementers because unscrupulous implementers of Ajtai-Dwork cryptosystem can leak their private-keys without their awareness. Using techniques by Desmedt 4], we will show how one can make Ajtai-Dwork cryptosystem abuse-free. At the end of the paper, we will point out that our abuses of Ajtai-Dwork cryptosystem can be applied to all probabilistic cryp-tosystems, for example, to cryptosystems by McEliece 10] and by Goldreich, Goldwasser, and Halevi 8].
منابع مشابه
Cryptanalysis of the Ajtai-Dwork Cryptosystem
Recently, Ajtai discovered a fascinating connection between the worst-case complexity and the average-case complexity of some wellknown lattice problems. Later, Ajtai and Dwork proposed a cryptosystem inspired by Ajtai’s work, provably secure if a particular lattice problem is difficult in the worst-case. We present a heuristic attack (to recover the private key) against this celebrated cryptos...
متن کاملCryptanalysis of the Ajtai - Dwork
Recently, Ajtai discovered a fascinating connection between the worst-case complexity and the average-case complexity of some well-known lattice problems. Later, Ajtai and Dwork proposed a cryptosystem inspired by Ajtai's work, provably secure if a particular lattice problem is diicult in the worst-case. We present a heuristic attack (to recover the private key) against this celebrated cryptosy...
متن کاملEliminating Decryption Errors in the Ajtai-Dwork Cryptosystem
Following Ajtai’s lcad, Ajtai and Dwork have recently introduced a public-key encryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. Their encryption method m a y cause decryption errors, though with small probability (i.e., inversely proportional to the security parameter). In this paper we modify the encryption method...
متن کاملThe First and Fourth Public-Key Cryptosystems with Worst-Case/Average-Case Equivalence
We describe a public-key cryptosystem with worst-case/average case equivalence. The cryptosystem has an amortized plaintext to ciphertext expansion of O(n), relies on the hardness of the Õ(n)-unique shortest vector problem for lattices, and requires a public key of size at most O(n) bits. The new cryptosystem generalizes a conceptually simple modification of the “Ajtai-Dwork” cryptosystem. We p...
متن کاملReaction Attacks Against Several Public-Key Cryptosystem
We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their security on the apparent intractibility of one or more problems. The attacks we present do not violate the intractibility of the underlying problems, but instead obtain information about the private key or plaintext by watching...
متن کامل