Revisiting Modular Inversion Hidden Number Problem and its applications

The Modular Inversion Hidden Number Problem (MIHNP), which was proposed at Asiacrypt 2001 by Boneh, Halevi, and Howgrave-Graham, is summarized as follows: Assume that the δ most significant bits of z are denoted by MSB δ ( z ). The goal is to retrieve the hidden number α ∈ Z p given many samples ( t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information theory 2023-08, Vol.69 (8), p.1-1
Hauptverfasser: Xu, Jun, Sarkar, Santanu, Hu, Lei, Wang, Huaxiong, Pan, Yanbin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Modular Inversion Hidden Number Problem (MIHNP), which was proposed at Asiacrypt 2001 by Boneh, Halevi, and Howgrave-Graham, is summarized as follows: Assume that the δ most significant bits of z are denoted by MSB δ ( z ). The goal is to retrieve the hidden number α ∈ Z p given many samples ( t i ,MSB δ ((α + t i ) -1 mod p )) for random t i ∈ Z p . MIHNP is a significant subset of Hidden Number Problems. Eichenauer and Lehn introduced the Inversive Congruential Generator (ICG) in 1986. It is basically characterized as follows: For iterated relations v i +1 = ( av i -1 + b ) mod p with a secret seed v 0 ∈ Z p , each iteration produces MSB δ ( v i +1 ) where i ≥ 0. The ICG family of pseudorandom number generators is a significant subclass of number-theoretic pseudorandom number generators. Sakai-Kasahara scheme is an identity-based encryption (IBE) system proposed by Sakai and Kasahara. It is one of the few commercially implemented identity-based encryption schemes. We explore the Coppersmith approach for solving a class of modular polynomial equations, which is derived from the recovery issue for the hidden number α in MIHNP and the secret seed v 0 in ICG, respectively. Take a positive integer n = d 3+ o (1) for some positive integer constant d . We propose a heuristic technique for recovering the hidden number α or secret seed v 0 with a probability close to 1 when δ/ log 2 p > 1/ d +1 + o ( 1/ d ). The attack's total time complexity is polynomial in the order of log 2 p , with the complexity of the LLL algorithm increasing as d O(d) and the complexity of the Gröbner basis computation increasing as d O(n) . When d > 2, this asymptotic bound surpasses the asymptotic bound δ/ log 2 p > 1/3 established by Boneh, Halevi, and Howgrave-Graham at Asiacrypt 2001. This is the first time a more precise constraint for solving MIHNP is established, implying that the claim that MIHNP is difficult is violated whenever δ/ log 2 p < 1/3. Then we study ICG. To our knowledge, we achieve the best performance for attacking ICG to date. Finally, we provide an MIHNP-based lattice approach that recovers the signer's secret key in the Sakai-Kasahara type signatures when the most (least) significant bits of the signing exponents are exposed. This improves the existing work in this direction.
ISSN:0018-9448
1557-9654
DOI:10.1109/TIT.2023.3263485