AIM: symmetric primitive for shorter signatures with stronger security

S Kim, J Ha, M Son, B Lee, D Moon, J Lee… - Proceedings of the …, 2023 - dl.acm.org
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, J Lee
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023dl.acm.org
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are
recently attracting significant attention as their security solely depends on the one-wayness
of the underlying primitive, providing diversity for the hardness assumption in post-quantum
cryptography. Recent MPCitH-friendly ciphers have been designed using simple algebraic S-
boxes operating on a large field in order to improve the performance of the resulting
signature schemes. Due to their simple algebraic structures, their security against algebraic …
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends on the one-wayness of the underlying primitive, providing diversity for the hardness assumption in post-quantum cryptography. Recent MPCitH-friendly ciphers have been designed using simple algebraic S-boxes operating on a large field in order to improve the performance of the resulting signature schemes. Due to their simple algebraic structures, their security against algebraic attacks should be comprehensively studied.
In this paper, we refine algebraic cryptanalysis of power mapping based S-boxes over binary extension fields, and cryptographic primitives based on such S-boxes. In particular, for the Gröbner basis attack over ⅇ2, we experimentally show that the exact number of Boolean quadratic equations obtained from the underlying S-boxes is critical to correctly estimate the theoretic complexity based on the degree of regularity. Similarly, it turns out that the XL attack might be faster when all possible quadratic equations are found and used from the S-boxes. This refined cryptanalysis leads to more precise algebraic analysis of cryptographic primitives based on algebraic S-boxes.
Considering the refined algebraic cryptanalysis, we propose a new one-way function, dubbed AIM, as an MPCitH-friendly symmetric primitive with high resistance to algebraic attacks. The security of AIM is comprehensively analyzed with respect to algebraic, statistical, quantum, and generic attacks. AIM is combined with the BN++ proof system, yielding a new signature scheme, dubbed AIM. Our implementation shows that AIM outperforms existing signature schemes based on symmetric primitives in terms of signature size and signing time.
ACM Digital Library
Showing the best result for this search. See all results