Masking the GLP Lattice-Based Signature Scheme at Any Order

Abstract : Recently, numerous physical attacks have been demonstrated against lattice-based schemes, often exploiting their unique properties such as the reliance on Gaussian distributions, rejection sampling and FFT-based polynomial multiplication. As the call for concrete implementations and deployment of postquantum cryptography becomes more pressing, protecting against those attacks is an important problem. However, few countermeasures have been proposed so far. In particular, masking has been applied to the decryption procedure of some lattice-based encryption schemes, but the much more difficult case of signatures (which are highly non-linear and typically involve randomness) has not been considered until now. In this paper, we describe the first masked implementation of a lattice-based signature scheme. Since masking Gaussian sampling and other procedures involving contrived probability distribution would be prohibitively inefficient, we focus on the GLP scheme of Güneysu, Lyubashevsky and Pöppelmann (CHES 2012). We show how to provably mask it in the Ishai--Sahai--Wagner model (CRYPTO 2003) at any order in a relatively efficient manner, using extensions of the techniques of Coron et al for converting between arithmetic and Boolean masking. Our proof relies on a mild generalization of probing security that supports the notion of public outputs. We also provide a proof-of-concept implementation to assess the efficiency of the proposed countermeasure
Document type :
Conference papers
Liste complète des métadonnées

Cited literature [20 references]  Display  Hide  Download
Contributor : Mélissa Rossi <>
Submitted on : Monday, October 22, 2018 - 2:34:29 PM
Last modification on : Wednesday, March 27, 2019 - 1:34:12 AM
Document(s) archivé(s) le : Wednesday, January 23, 2019 - 2:22:54 PM


Files produced by the author(s)



Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, et al.. Masking the GLP Lattice-Based Signature Scheme at Any Order. Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2018, Tel Aviv, Israel. pp.354-384, ⟨10.1007/978-3-319-78375-8_12⟩. ⟨hal-01900708⟩



Record views


Files downloads