Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures
作者:
Highlights:
•
摘要
We investigate the problem of securely outsourcing the modular exponentiations in cryptography to an untrusted server, and analyze the security and the efficiency of three privacy-preserving outsourcing protocols for exponentiations proposed in Ding et al. (2017) [18]. Based on Coppersmith's lattice-based method, we present heuristic polynomial-time and ciphertext-only weak-key attacks on these protocols, which shows that the recommended size of the secret keys in their protocols can not assure the input privacy of the exponents. Correspondingly, we explicitly estimate the size of the secure secret keys to circumvent our attacks, and analyze the efficiency of the revised protocols with security settings. Our theoretical analysis and experimental results demonstrate that the protocol of single modular exponentiation is unavailable, the protocol of simultaneous modular exponentiations is not so efficient as claimed but still available, and the protocol of multiple modular exponentiations becomes more efficient as the number of exponentiations increases.
论文关键词:Computation outsourcing,Modular exponentiations,Weak-key attack,Coppersmith's method,Privacy-preserving
论文评审过程:Received 26 November 2019, Revised 10 December 2020, Accepted 27 April 2021, Available online 11 May 2021, Version of Record 13 May 2021.
论文官网地址:https://doi.org/10.1016/j.jcss.2021.04.006