Abstract
This paper describes an attack on an identification scheme based on the permuted perceptron problem (PPP) as suggested by Point-cheval. The attack finds the secret key, a vector of n binary elements, in time much faster than estimated by its designer. The basic idea in the attack is to use several applications of a simulated annealing algorithm and combine the outcomes into an improved search. It is left as an open problem to what extent the methods developed in this paper are useful also in other combinatorial problems.
Chapter PDF
References
E. Aarts and J. Korst. Simulated Annealing and Boltzmann Machines. Wiley, New York, 1989.
A. Fiat, A. Shamir. How to prove yourself: practical solutions of identification and signature problems. In A.M. Odlyzko, editor, Advances in Cryptology — CRYPTO’86, LNCS 263, pages 186–194. Springer-Verlag, 1987.
S. Goldwasser, S. Micali, C. Rackoff. Knowledge complexity of interactive proof systems. In Proceedings of the 17-th ACM Symposium on the Theory of Computing STOC, ACM, pages 291–304, 1985.
M. H. Hassoun. Fundamentals of Artificial Neural Networks. MIT Press, London, England, 1995.
D. Pointcheval. A new identification scheme based on the perceptrons problem. In L.C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology — EUROCRYPT’95, LNCS 921, pages 319–328. Springer Verlag, 1995.
D. Pointcheval. Les réseaux de neurones et leurs applications cryptographiques. Tech. rep. Laboratoire d’Informatique de l’École Normale Supérieure, February 1995. LIENS-95-2.
G. Poupard. A Realistic Security Analysis of Identification Schemes based on Combinatorial Problems. European Transactions on Telecommunications, vol. 8, Nr. 5, pages 471–480, 1997.
A. Shamir. An efficient identification scheme based on permuted kernels. In G. Brassard, editor, Advances in Cryptology — CRYPTO’89, LNCS 435, pages 606–609. Springer-Verlag, 1990.
J. Stern. A new identification scheme based on syndrome decoding. In D.R. Stinson, editor, Advances in Cryptology — CRYPTO’93, LNCS 773, pages 13–21. Springer-Verlag, 1994.
J. Stern. Designing identification schemes with keys of short size. In Y.G. Desmedt, editor, Advances in Cryptology — CRYPTO’94, LNCS 839, pages 164–173. Springer-Verlag, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Knudsen, L.R., Meier, W. (1999). Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. In: Stern, J. (eds) Advances in Cryptology — EUROCRYPT ’99. EUROCRYPT 1999. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48910-X_25
Download citation
DOI: https://doi.org/10.1007/3-540-48910-X_25
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65889-4
Online ISBN: 978-3-540-48910-8
eBook Packages: Springer Book Archive