Research Article

Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem

Table 1

Key substitution attacks (KSA) on signature schemes based on SIS problem.

Scheme Target equation for KSA Result

GPV [7] insecure
Lyubashevsky [8] insecure
matrix-BLISS [9] insecure
ring-BLISS [9]
-GPV unknown
-Lyubashevsky secure
-matrix-BLISS secure
-ring-BLISS secure

Insecure under some conditions.