TY - GEN
T1 - An experimental study of Kannan’s embedding technique for the search LWE problem
AU - Wang, Yuntao
AU - Aono, Yoshinori
AU - Takagi, Tsuyoshi
N1 - Funding Information:
Acknowledgment. This work was supported by JSPS KAKENHI Grant Number JP17J01987, JP26730069 and JST CREST Grant Number JPMJCR14D6, Japan.
Funding Information:
This work was supported by JSPS KAKENHI Grant Number JP17J01987, JP26730069 and JST CREST Grant Number JPMJCR14D6, Japan.
Publisher Copyright:
© Springer International Publishing AG, part of Springer Nature 2018.
PY - 2018
Y1 - 2018
N2 - The learning with errors (LWE) problem is considered as one of the most compelling candidates as the security base for the post-quantum cryptosystems. For the application of LWE based cryptographic schemes, the concrete parameters are necessary: the length n of secret vector, the moduli q and the deviation σ. In the middle of 2016, Germany TU Darmstadt group initiated the LWE Challenge in order to assess the hardness of LWE problems. There are several approaches to solve the LWE problem via reducing LWE to other lattice problems. Xu et al.’s group solved some LWE Challenge instances using Liu and Nguyen’s adapted enumeration technique (reducing LWE to BDD problem) [14] and they published this result at ACNS 2017 [23]. In this paper, we study Kannan’s embedding technique (reducing LWE to unique SVP problem) to solve the LWE problem in the aspect of practice. The lattice reduction algorithm we use is the progressive BKZ [2, 3]. At first, from our experimental results we can intuitively observe that the embedding technique is more efficient with the embedding factor M closer to 1. Then especially for the cases of σ/q= 0.005, we will give an preliminary analysis for the runtime and give an estimation for the proper size of parameters. Moreover, our experimental results show that for n≥ 55 and the fixed σ/q= 0.005, the embedding technique with progressive BKZ is more efficient than Xu et al.’s implementation of the enumeration algorithm in [21, 23]. Finally, by our parameter setting, we succeeded in solving the LWE Challenge over (n, σ/q) = (70, 0.005) using 2 16.8 s (32.73 single core hours).
AB - The learning with errors (LWE) problem is considered as one of the most compelling candidates as the security base for the post-quantum cryptosystems. For the application of LWE based cryptographic schemes, the concrete parameters are necessary: the length n of secret vector, the moduli q and the deviation σ. In the middle of 2016, Germany TU Darmstadt group initiated the LWE Challenge in order to assess the hardness of LWE problems. There are several approaches to solve the LWE problem via reducing LWE to other lattice problems. Xu et al.’s group solved some LWE Challenge instances using Liu and Nguyen’s adapted enumeration technique (reducing LWE to BDD problem) [14] and they published this result at ACNS 2017 [23]. In this paper, we study Kannan’s embedding technique (reducing LWE to unique SVP problem) to solve the LWE problem in the aspect of practice. The lattice reduction algorithm we use is the progressive BKZ [2, 3]. At first, from our experimental results we can intuitively observe that the embedding technique is more efficient with the embedding factor M closer to 1. Then especially for the cases of σ/q= 0.005, we will give an preliminary analysis for the runtime and give an estimation for the proper size of parameters. Moreover, our experimental results show that for n≥ 55 and the fixed σ/q= 0.005, the embedding technique with progressive BKZ is more efficient than Xu et al.’s implementation of the enumeration algorithm in [21, 23]. Finally, by our parameter setting, we succeeded in solving the LWE Challenge over (n, σ/q) = (70, 0.005) using 2 16.8 s (32.73 single core hours).
UR - http://www.scopus.com/inward/record.url?scp=85045994359&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045994359&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-89500-0_47
DO - 10.1007/978-3-319-89500-0_47
M3 - Conference contribution
AN - SCOPUS:85045994359
SN - 9783319894997
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 541
EP - 553
BT - Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings
A2 - Qing, Sihan
A2 - Liu, Dongmei
A2 - Mitchell, Chris
A2 - Chen, Liqun
PB - Springer Verlag
T2 - 19th International Conference on Information and Communications Security, ICICS 2017
Y2 - 6 December 2017 through 8 December 2017
ER -