Abstract
In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that the sender in the two-lock cryptosystem can retrieve the secret key of the receiver fairly easily. We have implemented the attack on a Pentium 4 2.5 GHz processor. For the parameters given in [7], it takes only several minutes to break that knapsack based two-lock cryptosystem.
Supported by National Natural Science Foundation of China (Grant No. 60273027), National Key Foundation Research 973 project (Grant No. G1999035802) and National Science Fund for Distinguished Young Scholars (Grant No. 60025205)
Chapter PDF
Similar content being viewed by others
References
Bao, F., Deng, R., Feng, P.: An Efficient and Practical Scheme for Privacy Protection in E-commerce of Digital Goods. In: 2nd International Conference on Information and Communications Security-ICICS 2000, pp. 162–170. Springer, Heidelberg (2000)
Brickell, E.F., Odlyzko, A.M.: Cryptanalysis: A Survey of Recent Results. Proc. IEEE 76, 578–593 (1988)
Diffie, W.: The First Ten Years of Public-Key Cryptography. Proc. IEEE 76, 560–577 (1988)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, San Francisco (1979)
Merkle, R.C., Hellman, M.: Hiding Information and Signatures in Trapdoor Knapsack. IEEE Transactions on Information theory 24(5), 525–530 (1978)
Rabin, M.: How to Exchange Secrets by Oblivious Transfer, Technical Report TR 81, Aiken computation Laboratory, Harvard University (1981)
Wu, Q., Zhang, J., Wang, Y.: Practical t-out-n Oblivious Transfer and Its Applications. In: 5th International Conference on Information and Communications Security-ICICS 2003, Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, B., Wu, H., Feng, D., Bao, F. (2004). Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. In: Jakobsson, M., Yung, M., Zhou, J. (eds) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol 3089. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24852-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-24852-1_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22217-0
Online ISBN: 978-3-540-24852-1
eBook Packages: Springer Book Archive