How to Break Shamir's Asymmetric Basis

  • Authors:
  • Thorsten Theobald

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

At Crypto 93, Shamir proposed a family of signature schemes using algebraic bases. Coppersmith, Stern and Vaudenay presented an attack on one variant of the cryptosystem. Their attack does not recover the secret key. For one of the variants proposed by Shamir we show how to recover the secret key. Our attack is based on algebraic methods which are also applicable to many other instances of polynomial equations in the presence of some trapdoor condition.