Better Key Sizes (and Attacks) for LWE-Based Encryption

被引:0
|
作者
Lindner, Richard [1 ]
Peikert, Chris [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2011 | 2011年 / 6558卷
基金
美国国家科学基金会;
关键词
lattice-based cryptography; basis reduction; learning with errors; CRYPTOGRAPHIC PRIMITIVES; LATTICE REDUCTION; EFFICIENT; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the concrete security and key sizes of theoretically sound lattice-based encryption schemes based on the "learning with errors'' (DATE) problem. Our main contributions are: (I) a new lattice attack on ME that combines basis reduction with an enumeration algorithm admitting a time/success tradeoff, which performs better than the simple distinguishing attack considered in prior analyses; (2) concrete parameters and security estimates for an LWE-based cryptosystem that is more compact and efficient than the well-known schemes from the literature. Our new key sizes are up to 10 tunes smaller than prior examples, while providing even stronger concrete security levels.
引用
收藏
页码:319 / +
页数:3
相关论文
共 50 条
  • [41] Simple Construction of PEKS from LWE-Based IBE in the Standard Model
    Shinoki, Hirotomo
    Sato, Hisayoshi
    Yoshino, Masayuki
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I, 2025, 14903 : 168 - 186
  • [42] Implementing Private K-Means Clustering Using a LWE-based Cryptosystem
    Theodouli, Anastasia
    Draziotis, Konstantinos A.
    Gounaris, Anastasios
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 88 - 93
  • [43] Identity-Based Encryption from LWE with More Compact Master Public Key
    Abla, Parhat
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 319 - 353
  • [44] Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
    Bai Jian
    Yang Yatao
    Li Zichen
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 355 - 358
  • [45] A public key encryption scheme based on a new variant of LWE with small cipher size
    Wang, Ziqing
    Tang, Dianhua
    Yang, Haomiao
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 117
  • [46] Public Key Authenticated Encryption with Keyword Search from LWE
    Cheng, Leixiao
    Meng, Fei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 303 - 324
  • [47] Non-interactive verifiable LWE-based multi secret sharing scheme
    Niloofar Kiamari
    Massoud Hadian
    Samaneh Mashhadi
    Multimedia Tools and Applications, 2023, 82 : 22175 - 22187
  • [48] Non-interactive verifiable LWE-based multi secret sharing scheme
    Kiamari, Niloofar
    Hadian, Massoud
    Mashhadi, Samaneh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22175 - 22187
  • [49] LWE-Based Single-Server Block Private Information Retrieval Protocol
    Liu, Shuai
    Hu, Bin
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 469 - 480
  • [50] Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
    Kraitsberg, Michael
    Lindell, Yehuda
    Osheter, Valery
    Smart, Nigel P.
    Alaoui, Younes Talibi
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 192 - 210