Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited

Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussia...

Full description

Saved in:
Bibliographic Details
Main Authors: Huiwen Jia, Yupu Hu, Chunming Tang
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12039
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832546645189853184
author Huiwen Jia
Yupu Hu
Chunming Tang
author_facet Huiwen Jia
Yupu Hu
Chunming Tang
author_sort Huiwen Jia
collection DOAJ
description Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. The implementation shows that the sizes of the hash‐and‐sign signature scheme can be reduced to 3.67 kB for an estimation of 81.67‐bit security, and 9.97 kB for an estimation of 168.81‐bit security. In this study, the spherical sampling method is adapted to the non‐spherical setting, without leaking any information about the trapdoor. Due to the fact that the signature size and the concrete security are closely related to the Gaussian parameter of the sampling algorithm, this technique provides a tradeoff between them. Specifically, two modes of parameters were set up for different goals. (a) Mode 1 admits to achieve the ‘win–win’ scenario, that is, gain concrete security and simultaneously reduce the signature size. Our proof‐of‐concept implementation shows that for an estimation of 94.5‐ and 185.88‐bit security, the signature sizes can be reduced to 3.3 and 6.98 kB. (b) Mode 2 aims mainly to further reduce the signature sizes, without a decrease in the security level. The implementation shows that the signature size can be reduced to 2.35 kB for an estimation of 81.67‐bit security, and 5.75 kB for an estimation of 168.82‐bit security.
format Article
id doaj-art-11bdbc61a3434842b9eead64542a82de
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-11bdbc61a3434842b9eead64542a82de2025-02-03T06:47:37ZengWileyIET Information Security1751-87091751-87172022-01-01161415010.1049/ise2.12039Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisitedHuiwen Jia0Yupu Hu1Chunming Tang2Key Laboratory of Information Security Guangzhou University Guangzhou ChinaState Key Laboratory of Integrated Service Networks Xidian University Xi’an ChinaKey Laboratory of Information Security Guangzhou University Guangzhou ChinaAbstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. The implementation shows that the sizes of the hash‐and‐sign signature scheme can be reduced to 3.67 kB for an estimation of 81.67‐bit security, and 9.97 kB for an estimation of 168.81‐bit security. In this study, the spherical sampling method is adapted to the non‐spherical setting, without leaking any information about the trapdoor. Due to the fact that the signature size and the concrete security are closely related to the Gaussian parameter of the sampling algorithm, this technique provides a tradeoff between them. Specifically, two modes of parameters were set up for different goals. (a) Mode 1 admits to achieve the ‘win–win’ scenario, that is, gain concrete security and simultaneously reduce the signature size. Our proof‐of‐concept implementation shows that for an estimation of 94.5‐ and 185.88‐bit security, the signature sizes can be reduced to 3.3 and 6.98 kB. (b) Mode 2 aims mainly to further reduce the signature sizes, without a decrease in the security level. The implementation shows that the signature size can be reduced to 2.35 kB for an estimation of 81.67‐bit security, and 5.75 kB for an estimation of 168.82‐bit security.https://doi.org/10.1049/ise2.12039sampling methodsdigital signaturescryptographyGaussian distribution
spellingShingle Huiwen Jia
Yupu Hu
Chunming Tang
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
IET Information Security
sampling methods
digital signatures
cryptography
Gaussian distribution
title Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
title_full Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
title_fullStr Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
title_full_unstemmed Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
title_short Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
title_sort lattice based hash and sign signatures using approximate trapdoor revisited
topic sampling methods
digital signatures
cryptography
Gaussian distribution
url https://doi.org/10.1049/ise2.12039
work_keys_str_mv AT huiwenjia latticebasedhashandsignsignaturesusingapproximatetrapdoorrevisited
AT yupuhu latticebasedhashandsignsignaturesusingapproximatetrapdoorrevisited
AT chunmingtang latticebasedhashandsignsignaturesusingapproximatetrapdoorrevisited