Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika. Supplement, 2024, Issue 17, Pages 63–70
DOI: https://doi.org/10.17223/2226308X/17/15
(Mi pdma645)
 

Mathematical Methods of Cryptography

On the security of some algorithms over a group of points of elliptic curves

A. O. Bakharevab, K. D. Tsaregorodtsevb

a Novosibirsk State University
b АО «НПК «Криптонит», г. Москва
References:
Abstract: The results of the analysis of the VKO scheme and the combined VKO+GOST signature scheme in “generalized group” and “bijective random oracle” heuristics are presented. Two security models have been introduced. In the model for VKO scheme, the adversary has to tell whether the key that it obtains as a challenge is chosen uniformly random or it is generated via VKO scheme. The adversary has an access to Combine oracle, which takes ephemeral public key $epk$ as an input and returns a shared key obtained via VKO scheme using long-term secret key $sk$. In the model for combined VKO+GOST signature scheme, the adversary has the additional opportunity to obtain GOST signatures on the long-term secret key $sk$ (i.e., the key $sk$ is used as a static component of VKO scheme and as a long-term secret key for the signature scheme). It has been shown that in the generic group heuristic the advantage of the adversary making at most $q_\text{com}$ queries to the Combine oracle and at most $q_\text{group}$ queries to the group oracle can be upper bounded by $2 q^{-1} (q_\text{group} + q_\text{comb})^2$ (plus a minor summand responsible for the possibility of attacks on the hash function used in the scheme), where $q$ is the base group order. The result is tight due to the existence of discrete-log finding algorithms with the $\mathcal{O}(\sqrt{q})$ complexity. For the combined VKO+GOST scheme, it has been shown that in the Bijective Random Oracle heuristic the problem can be reduced to the model for VKO scheme without signing oracle (i.e., GOST signatures do not leak any useful information).
Keywords: provable security, VKO, signature scheme, joint security.
Document Type: Article
UDC: 519.7
Language: Russian
Citation: A. O. Bakharev, K. D. Tsaregorodtsev, “On the security of some algorithms over a group of points of elliptic curves”, Prikl. Diskr. Mat. Suppl., 2024, no. 17, 63–70
Citation in format AMSBIB
\Bibitem{BakTsa24}
\by A.~O.~Bakharev, K.~D.~Tsaregorodtsev
\paper On the security of some algorithms over a group of points of elliptic curves
\jour Prikl. Diskr. Mat. Suppl.
\yr 2024
\issue 17
\pages 63--70
\mathnet{http://mi.mathnet.ru/pdma645}
\crossref{https://doi.org/10.17223/2226308X/17/15}
Linking options:
  • https://www.mathnet.ru/eng/pdma645
  • https://www.mathnet.ru/eng/pdma/y2024/i17/p63
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Prikladnaya Diskretnaya Matematika. Supplement
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025