An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem
Abstract
:1. Introduction
2. Materials and Methods
2.1. Polynomial Reconstruction Problem (PRP)
2.2. PRP Computational Complexity
2.3. Vandermonde Method
- Write the general formula of the bivariate polynomial of degree .
- Evaluate the polynomial at points .
- Solve the linear equation system.
2.4. AAK-Cryptosystem
Algorithm 1 Key Generation Process |
Input: Parameters () Output: Public Key, and secret key pair
|
Algorithm 2 Encryption Process |
Input: Message, Output: Ciphertext,
|
Algorithm 3 Decryption Process |
Input: Ciphertext, Output: Message polynomial,
|
Proof of Correctness
2.5. Indistinguishable under Chosen-Plaintext Attack (IND-CPA)
- The random oracle initializes a cryptographic scheme and generates as well as choosing random and publishing public key , while secret key is kept secret.
- The PPTA chooses two messages, and , and sends them to the random oracle.
- The random oracle randomly chooses one out of the two messages and encrypts it; then, it sends ciphertext to the PPTA.
- The PPTA determines . If , then it outputs 1; else, 0.
3. The Attack
3.1. Cryptanalysis of AAK-Cryptosystem
- (i)
- When , if , then there exists sub-square matrix in .
- (ii)
- When , if , then there exists sub-square matrix in .
3.2. Algorithm for Theorem 1
Algorithm 4 Listing all possible candidates of secret key via Theorem 1 |
Input: Public key, and ciphertext, Output: Secret key,
|
3.3. Numerical Illustration of Theorem 1
3.4. Indistinguishable under Chosen Plaintext Attack on AAK-Cryptosystem
- It chooses two messages, and , in which identical elements do not share the same position in the vector and sends it to the random oracle.
- The random oracle relays the ciphertext, where .
- It computes based on Theorem 1.
- It computes .
- Since the PPTA knows about secret key , the PPTA can check the vector entry positions. Due to the fact that e has vector elements equal to 0 totaling , the PPTA can identify b.
3.4.1. Algorithm for Theorem 2
Algorithm 5 IND -CPA on the AAK-Cryptosystem using Theorem 2 |
Input: Messages pair Output:b where
|
3.4.2. Numerical Illustration of Theorem 2
4. Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
PRP | Polynomial Reconstruction Problem |
IND-CPA | Indistinguishable under Chosen Plaintext Attack |
PPTA | Probabilistic Polynomial Time Adversary |
Appendix A
References
- Brassard, G.; Lutkenhaus, N.; Mor, T.; Sanders, B.C. Security Aspects of Practical Quantum Cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; pp. 289–299. [Google Scholar]
- Cambou, B.; Gowanlock, M.; Yildiz, B.; Ghanaimiandoab, D.; Lee, K.; Nelson, S.; Philabaum, C.; Stenberg, A.; Wright, J. Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions. Appl. Sci. 2021, 11, 2801. [Google Scholar] [CrossRef]
- Shor, P.W. Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Song, B.; Zhao, Y. Provably Secure Identity-Based Identification and Signature Schemes From Code Assumptions. PLoS ONE 2017, 12, e018289. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shi, J.; Chen, S.; Lu, Y.; Feng, Y.; Shi, R.; Yang, Y.; Li, J. An approach to cryptography based on continuous-variable quantum neural network. Sci. Rep. 2020, 10, 2107. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Jordan, S. Quantum Algorithm Zoo. 2011. Available online: https://quantumalgorithmzoo.org/ (accessed on 5 January 2023).
- Gaborit, P.; Otmani, A.; Kalachi, H.T. Polynomial-Time Key Recovery Attack on the Faure–Loidreau Scheme Based on Gabidulin Codes. Des. Codes Cryptogr. 2018, 86, 1391–1403. [Google Scholar] [CrossRef] [Green Version]
- Imran, M.; Abideen, Z.U.; Pagliarini, S. An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms. Electronics 2020, 9, 1953. [Google Scholar] [CrossRef]
- Naor, M.; Pinkas, B. Oblivious Transfer and Polynomial Evaluation. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, Atlanta, GA, USA, 1–4 May 1999; pp. 245–254. [Google Scholar]
- Kiayias, A.; Yung, M. Directions in Polynomial Reconstruction Based Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2004, 87, 978–985. [Google Scholar]
- Guruswami, V.; Sudan, M. Improved decoding of Reed-Solomon and Algebraic-Geometry Codes. IEEE Trans. Inf. Theory 1999, 45, 1757–1767. [Google Scholar] [CrossRef] [Green Version]
- Augot, D.; Finiasz, M. A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, 4–8 May 2003; pp. 229–240. [Google Scholar]
- Kiayias, A.; Yung, M. Polynomial Reconstruction Based Cryptography. In Proceedings of the International Workshop on Selected Areas in Cryptography, Toronto, ON, Canada, 16–17 August 2001; pp. 129–133. [Google Scholar]
- Kiayias, A.; Yung, M. Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System under Optimal Parameter Choice. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Jeju, Republic of Korea, 5–9 December 2004; pp. 401–416. [Google Scholar]
- Coron, J.S. Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. In Proceedings of the International Workshop on Theory and Practice in Public Key Cryptography, Singapore, 1–4 March 2004; pp. 14–27. [Google Scholar]
- Ajeena, R.K.; Kamarulhaili, H.; Almaliky, S.B. Bivariate Polynomials Public Key Encryption Schemes. Int. J. Cryptol. Res. 2013, 4, 73–83. [Google Scholar]
- Lin, C.Y.; Wu, J.L. Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion. Entropy 2020, 22, 589. [Google Scholar] [CrossRef] [PubMed]
- Kuwakado, H.; Morii, M. Quantum Distinguisher between the 3-Round Feistel Cipher and the Random Permutation. In Proceedings of the IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 2682–2685. [Google Scholar]
- Yusof, S.N.; Kamel Ariffin, M.R. An Empirical Attack on a Polynomial Reconstruction Problem Potential Cryptosystem. Int. J. Cryptol. Res. 2021, 11, 31–48. [Google Scholar]
- Bleichenbacher, D.; Nguyen, P.Q. Noisy Polynomial Interpolation and Noisy Chinese Remaindering. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Volume 1807, pp. 53–69. [Google Scholar]
- Sadkhan, S.B.; Ruma, K.H. Evaluation of Polynomial Reconstruction Problem using Lagrange Interpolation Method. In Proceedings of the 2006 2nd International Conference on Information and Communication Technologies, Damascus, Syria, 24–28 April 2006; Volume 1, pp. 1399–1403. [Google Scholar]
- Augot, D.; Finiasz, M.; Loidreau, P. Using the Trace Operator to Repair the Polynomial Reconstruction Based Cryptosystem Presented at Eurocrypt 2003. Int. Assoc. Cryptologic Res. 2003, 209. [Google Scholar]
- Zhu, S.; Han, Y. Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization. China Commun. 2021, 18, 35–46. [Google Scholar] [CrossRef]
- Carstens, T.V.; Ebrahimi, E.; Tabia, G.N.; Unruh, D. On Quantum Indistinguishability Under Chosen Plaintext Attack. Int. Assoc. Cryptologic Res. 2020, 596. [Google Scholar]
- Abdalla, M.; Benhamouda, F.; Pointcheval, D. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. IET Inf. Secur. 2016, 10, 288–303. [Google Scholar] [CrossRef] [Green Version]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yusof, S.N.; Kamel Ariffin, M.R.; Lau, T.S.C.; Salim, N.R.; Yip, S.-C.; Yap, T.T.V. An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. Axioms 2023, 12, 304. https://doi.org/10.3390/axioms12030304
Yusof SN, Kamel Ariffin MR, Lau TSC, Salim NR, Yip S-C, Yap TTV. An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. Axioms. 2023; 12(3):304. https://doi.org/10.3390/axioms12030304
Chicago/Turabian StyleYusof, Siti Nabilah, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nur Raidah Salim, Sook-Chin Yip, and Timothy Tzen Vun Yap. 2023. "An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem" Axioms 12, no. 3: 304. https://doi.org/10.3390/axioms12030304
APA StyleYusof, S. N., Kamel Ariffin, M. R., Lau, T. S. C., Salim, N. R., Yip, S. -C., & Yap, T. T. V. (2023). An IND-CPA Analysis of a Cryptosystem Based on Bivariate Polynomial Reconstruction Problem. Axioms, 12(3), 304. https://doi.org/10.3390/axioms12030304