Description
SQIsign is an isogeny-based signature scheme which has recently advanced to round 2 of NIST's call for additional post-quantum signatures. A central operation in SQIsign is lattice reduction of special full-rank lattices in dimension 4. As these input lattices are secret, this computation must be protected against side-channel attacks. However, known lattice reduction algorithms like the famous LLL algorithm are not naturally constant-time.
This talk presents a new, constant-time lattice reduction algorithm, developed in collaboration with Ottó Hanyecz, Alexander Karenin, Elena Kirshanova and Péter Kutas. We first give a short introduction to SQIsign without detailing its inner workings. Then, we analyze different existing lattice reduction algorithms, and present our constant-time version, which is based on the BKZ-2 algorithm. Finally, we explain some implementation choices and discuss the performance using two sets of parameters: one for provable guarantees on its output, and one for speed with a reasonable success rate.
Eprint: https://eprint.iacr.org/2025/027
Infos pratiques
Prochains exposés
-
Dual attacks in code-based (and lattice-based) cryptography
Orateur : Charles Meyer-Hilfiger - Inria Rennes
The hardness of the decoding problem and its generalization, the learning with errors problem, are respectively at the heart of the security of the Post-Quantum code-based scheme HQC and the lattice-based scheme Kyber. Both schemes are to be/now NIST standards. These problems have been actively studied for decades, and the complexity of the state-of-the-art algorithms to solve them is crucially[…]-
Cryptography
-
-
Lie algebras and the security of cryptosystems based on classical varieties in disguise
Orateur : Mingjie Chen - KU Leuven
In 2006, de Graaf et al. proposed a strategy based on Lie algebras for finding a linear transformation in the projective linear group that connects two linearly equivalent projective varieties defined over the rational numbers. Their method succeeds for several families of “classical” varieties, such as Veronese varieties, which are known to have large automorphism groups. In this talk, we[…]-
Cryptography
-