Practical analysis of key recovery attack against search-LWE problem

Momonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The security of a number of modern cryptographic schemes relies on the computational hardness of the learning with errors (LWE) problem. In 2015, Laine and Lauter analyzed a key recovery (or decoding) attack against the search variant of LWE. Their analysis is based on a generalization of the Boneh-Venkatesan method for the hidden number problem to LWE. They adopted the LLL algorithm and Babai’s nearest plane method in the attack against LWE, and they also demonstrated a successful range of the attack by experiments for hundreds of LWE instances. In this paper, we give an alternative analysis of the key recovery attack.While Laine and Lauter’s analysis gives explicit information about the effective approximation factor in the LLL algorithm and Babai’s nearest plane method, our analysis is useful to estimate which LWE instances can be solved by the key recovery attack. Furthermore, our analysis enables one to determine a successful range of the attack with practical lattice reduction such as the BKZ algorithm.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings
EditorsKatsunari Yoshioka, Kazuto Ogawa
PublisherSpringer Verlag
Pages164-181
Number of pages18
ISBN (Print)9783319445236
DOIs
Publication statusPublished - 2016
Event11th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2016 - Tokyo, Japan
Duration: Sept 12 2016Sept 14 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9836 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2016
Country/TerritoryJapan
CityTokyo
Period9/12/169/14/16

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Practical analysis of key recovery attack against search-LWE problem'. Together they form a unique fingerprint.

Cite this