Better Key Sizes (and Attacks) for LWE-Based Encryption

被引:0
|
作者
Lindner, Richard [1 ]
Peikert, Chris [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2011 | 2011年 / 6558卷
基金
美国国家科学基金会;
关键词
lattice-based cryptography; basis reduction; learning with errors; CRYPTOGRAPHIC PRIMITIVES; LATTICE REDUCTION; EFFICIENT; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the concrete security and key sizes of theoretically sound lattice-based encryption schemes based on the "learning with errors'' (DATE) problem. Our main contributions are: (I) a new lattice attack on ME that combines basis reduction with an enumeration algorithm admitting a time/success tradeoff, which performs better than the simple distinguishing attack considered in prior analyses; (2) concrete parameters and security estimates for an LWE-based cryptosystem that is more compact and efficient than the well-known schemes from the literature. Our new key sizes are up to 10 tunes smaller than prior examples, while providing even stronger concrete security levels.
引用
收藏
页码:319 / +
页数:3
相关论文
共 50 条
  • [1] Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching
    Li, Zengpeng
    Ma, Chunguang
    Du, Gang
    Ouyang, Weiping
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1169 - 1174
  • [2] LWE-Based FHE with Better Parameters
    Wang, Fuqun
    Wang, Kunpeng
    Li, Bao
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 175 - 192
  • [3] Packed Ciphertexts in LWE-Based Homomorphic Encryption
    Brakerski, Zvika
    Gentry, Craig
    Halevi, Shai
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 1 - 13
  • [4] Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption
    Alisic, Rijad
    Kim, Junsoo
    Sandberg, Henrik
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 1249 - 1254
  • [5] AN LWE-BASED KEY TRANSFER PROTOCOL WITH ANONYMITY
    Georgescu, Adela
    TATRACRYPT '12, 2012, 53 : 119 - 135
  • [6] A LWE-Based Receiver-Deniable Encryption Scheme
    Chi, Po-Wen
    Wang, Ming-Hung
    Chuang, Yun-Hsin
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 124 - 133
  • [7] Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange
    Qin, Yue
    Ding, Ruoyu
    Cheng, Chi
    Bindel, Nina
    Pan, Yanbin
    Ding, Jintai
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 677 - 697
  • [8] Filianore: Better Multiplier Architectures for LWE-based Post-Quantum Key Exchange
    Bian, Song
    Hiromoto, Masayuki
    Sato, Takashi
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [9] Towards an efficient LWE-based fully homomorphic encryption scheme
    Dowerah, Uddipana
    Krishnaswamy, Srinivasan
    IET INFORMATION SECURITY, 2022, 16 (04) : 235 - 252
  • [10] Proficient LWE-Based Encryption Using CAN Compression Algorithm
    Challa, RatnaKumari
    VijayaKumari, G.
    Sruthi, P. Satya
    2015 CONFERENCE ON POWER, CONTROL, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES FOR SUSTAINABLE GROWTH (PCCCTSG), 2015, : 304 - 307