Better Key Sizes (and Attacks) for LWE-Based Encryption

被引:0
|
作者
Lindner, Richard [1 ]
Peikert, Chris [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2011 | 2011年 / 6558卷
基金
美国国家科学基金会;
关键词
lattice-based cryptography; basis reduction; learning with errors; CRYPTOGRAPHIC PRIMITIVES; LATTICE REDUCTION; EFFICIENT; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the concrete security and key sizes of theoretically sound lattice-based encryption schemes based on the "learning with errors'' (DATE) problem. Our main contributions are: (I) a new lattice attack on ME that combines basis reduction with an enumeration algorithm admitting a time/success tradeoff, which performs better than the simple distinguishing attack considered in prior analyses; (2) concrete parameters and security estimates for an LWE-based cryptosystem that is more compact and efficient than the well-known schemes from the literature. Our new key sizes are up to 10 tunes smaller than prior examples, while providing even stronger concrete security levels.
引用
收藏
页码:319 / +
页数:3
相关论文
共 50 条
  • [31] Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE)
    Antwi-Boasiako, Emmanuel
    Zhou, Shijie
    Liao, Yongjian
    Dong, Yingjie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [32] DArL: Dynamic Parameter Adjustment for LWE-based Secure Inference
    Bian, Song
    Hiromoto, Masayuki
    Sato, Takashi
    2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1739 - 1744
  • [33] Exploring the Vulnerability of R-LWE Encryption to Fault Attacks
    Valencia, Felipe
    Oder, Tobias
    Gueneysu, Tim
    Regazzoni, Francesco
    PROCEEDINGS OF THE FIFTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS (CS2 2018), 2016, : 7 - 12
  • [34] Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs-Parallel PC Oracle Attacks on Kyber KEM and Beyond
    Rajendran G.
    Ravi P.
    D’anvers J.-P.
    Bhasin S.
    Chattopadhyay A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 418 - 446
  • [35] A LWE-based oblivious transfer protocol from indistinguishability obfuscation
    Zhang, Shanshan
    International Journal of Network Security, 2020, 22 (05): : 801 - 808
  • [36] Sender-side Public Key Deniable Encryption Scheme Based on LWE
    Wu W.
    Zheng J.
    Feng Y.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (02): : 192 - 199
  • [37] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [38] Public key encryption and encryption emulation attacks
    Osin, Denis
    Shpilrain, Vladimir
    COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2008, 5010 : 252 - 260
  • [39] How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
    Wang, Jiabo
    Ling, Cong
    ENTROPY, 2021, 23 (08)
  • [40] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378