A security upgrade on the GGH lattice-based cryptosystem

Arif Mandangan and Hailiza Kamarulhaili and Muhammad Asyraf Asbullah (2020) A security upgrade on the GGH lattice-based cryptosystem. Sains Malaysiana, 49. pp. 1471-1478. ISSN 0126-6039

[img] Text
A Security Upgrade on the GGH Lattice-based Cryptosystem ABSTRACT.pdf

Download (61kB)
[img] Text
A Security Upgrade on the GGH Lattice-based Cryptosystem.pdf
Restricted to Registered users only

Download (843kB) | Request a copy

Abstract

Due to the Nguyen’s attack, the Goldreich-Goldwasser-Halevi (GGH) encryption scheme, simply referred to as GGH cryptosystem, is considered broken. The GGH cryptosystem was initially addressed as the first practical lattice-based cryptosystem. Once the cryptosystem is implemented in a lattice dimension of 300 and above, its inventors was conjectured that the cryptosystem is intractable. This conjecture was based on thorough security analyses on the cryptosystem against some powerful attacks. This conjecture became more concrete when all initial efforts for decrypting the published GGH Internet Challenges were failed. However, a novel strategy by the Nguyen’s attack for simplifying the underlying Closest-Vector Problem (CVP) instance that arose from the cryptosystem, had successfully decrypted almost all the challenges and eventually made the cryptosystem being considered broken. Therefore, the Nguyen’s attack is considered as a fatal attack on the GGH cryptosystem. In this paper, we proposed a countermeasure to combat the Nguyen’s attack. By implementing the proposed countermeasure, we proved that the simplification of the underlying CVP instance could be prevented. We also proved that, the upgraded GGH cryptosystem remains practical where the decryption could be done without error. We are optimistic that, the upgraded GGH cryptosystem could make a remarkable return into the mainstream discussion of the lattice-based cryptography.

Item Type: Article
Keyword: Closest vector problem , GGH cryptosystem , Lattice-based cryptography , Post-quantum cryptography , Shortest-vector problem
Subjects: Q Science > QA Mathematics > QA1-939 Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science > QA76.75-76.765 Computer software
Department: FACULTY > Faculty of Science and Natural Resources
Depositing User: SAFRUDIN BIN DARUN -
Date Deposited: 22 Oct 2021 14:31
Last Modified: 22 Oct 2021 14:31
URI: https://eprints.ums.edu.my/id/eprint/30586

Actions (login required)

View Item View Item