Hybrid journal (It can contain Open Access articles) ISSN (Print) 1753-0563 - ISSN (Online) 1753-0571 Published by Inderscience Publishers[447 journals]

Authors:Joppe W. Bos, Michael Naehrig, Joop Van De Pol Pages: 313 - 329 Abstract: The security of many lattice-based cryptographic schemes relies on the hardness of finding short vectors in integral lattices. We propose a new variant of the parallel Gauss sieve algorithm to compute such short vectors. It combines favourable properties of previous approaches resulting in reduced run time and memory requirement per node. Our publicly available implementation outperforms all previous Gauss sieve approaches for dimensions 80, 88, and 96. When computing short vectors in ideal lattices, we show how to reduce the number of multiplications and comparisons by using a symbolic Fourier transform. We computed a short vector in a negacyclic ideal lattice of dimension 128 in less than nine days on 1,024 cores, more than twice as fast as the recent record computation for the same lattice on the same computer hardware. Keywords: lattice cryptanalysis; parallel Gauss sieve; ideal lattices; ring LWE Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 313 - 329 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089353 Issue No:Vol. 3, No. 4 (2018)

Authors:Arjen K. Lenstra, Benjamin Wesolowski Pages: 330 - 343 Abstract: Many applications require trustworthy generation of public random numbers. It is shown how this can be achieved using a hash function that is timed to be as slow as desired (<i>sloth</i>), while the correctness of the resulting hash can be verified quickly. It is shown how <i>sloth</i> can be used for uncontestable random number generation (<i>unicorn</i>), and how <i>unicorn</i> can be used for a new trustworthy random elliptic curves service (<i>trx</i>) and random-sample voting. Keywords: public random number generation; random beacon; slow-timed hash Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 330 - 343 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089354 Issue No:Vol. 3, No. 4 (2018)

Authors:Arjen K. Lenstra, Benjamin Wesolowski Pages: 344 - 362 Abstract: Succinct non-interactive zero-knowledge arguments of knowledge (Zk-SNARKs) are needed in many applications. Unfortunately, all previous zk-SNARKs for interesting languages are either inefficient for the prover, or are non-adaptive and based on a commitment scheme that depends both on the prover's input and on the language, i.e., they are not commit-and-prove (CaP) SNARKs. We propose a proof-friendly extractable commitment scheme, and use it to construct prover-efficient adaptive CaP succinct zk-SNARKs for different languages, that can all reuse committed data. In new zk-SNARKs, the prover computation is dominated by a linear number of cryptographic operations. We use batch-verification to decrease the verifier's computation; importantly, batch-verification can be used also in QAP-based zk-SNARKs. Keywords: batch verification; commit-and-prove; CaP; common reference string; CRS; non-interactive zero knowledge; NIZK; numerical NP-complete languages; range proof; Subset-Sum; zk-SNARK Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 344 - 362 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089355 Issue No:Vol. 3, No. 4 (2018)

Authors:Michael Clear, CiarÃ¡n Mc Goldrick Pages: 363 - 376 Abstract: The only known way to achieve attribute-based fully homomorphic encryption (ABFHE) is through indistinguishability obfuscation. The best we can do at the moment without obfuscation is attribute-based levelled FHE which allows circuits of an a priori bounded depth to be evaluated. This has been achieved from the learning with errors (LWE) assumption. However we know of no other way without obfuscation of constructing a scheme that can evaluate circuits of unbounded depth. In this paper, we present an ABFHE scheme that can evaluate circuits of unbounded depth but with one limitation: there is a bound <i>N</i> on the number of inputs that can be used in a circuit evaluation. The bound <i>N</i> could be thought of as a bound on the number of independent senders. Our scheme allows <i>N</i> to be exponentially large so we can set the parameters so that there is no limitation on the number of inputs in practice. Our construction relies on multi-key FHE and levelled ABFHE, both of which have been realised from LWE, and therefore we obtain a concrete scheme that is secure under LWE. Keywords: attribute-based encryption; ABE; fully homomorphic encryption; FHE Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 363 - 376 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089356 Issue No:Vol. 3, No. 4 (2018)

Authors:Augustin P. Sarr, Philippe Elbaz-Vincent Pages: 377 - 393 Abstract: The HMQV protocol is under consideration for IEEE P1363 standardisation. We provide a complementary analysis of the HMQV(-C) protocol. Namely, we point out a key compromise impersonation and a man-in-the-middle attack in the case of a static private key leakage, showing that the HMQV(-C) protocols cannot achieve their security goals. Next, we revisit the FHMQV building blocks, design and security arguments. We clarify the security and efficiency separation between HMQV and FHMQV, showing the advantages of FHMQV over HMQV. Keywords: authenticated key exchange; FHMQV; HMQV; key compromise impersonation; KCI attack; security model Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 377 - 393 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089357 Issue No:Vol. 3, No. 4 (2018)

Authors:Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate Pages: 394 - 406 Abstract: In online services, a service provider (SP) manages access logs containing customers' buying histories. Therefore, user's information is revealed from the exposed logs if each customer can be linked. In fact, such information exposure has occurred due to the popularisation of online services. To cope with this problem, SPs may only have to delete access logs, but then no illegitimate users will be traced from the logs. In this paper, we propose a log management mechanism of solving problems. Specifically, we consider single sign on (SSO) systems, since plural access logs might be connected by one account. We construct our privacy-enhanced access log management mechanism based on the Wang-Wang-Susilo SSO system (TrustCom, 2013) which applies the Schuldt-Hanaoka nominative signature scheme (ACNS, 2011). Finally, we estimte the efficiency of the proposed system, computation time is at most just over 80 milliseconds on a PC, which seems sufficiently practical. Keywords: nominative signature; single sign on system; access log management; digital signature Citation: International Journal of Applied Cryptography, Vol. 3, No. 4 (2017) pp. 394 - 406 PubDate: 2018-01-21T23:20:50-05:00 DOI: 10.1504/IJACT.2017.089373 Issue No:Vol. 3, No. 4 (2018)