2011
DOI: 10.1007/978-3-642-19074-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Better Key Sizes (and Attacks) for LWE-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
548
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 496 publications
(550 citation statements)
references
References 33 publications
2
548
0
Order By: Relevance
“…A security level of bits means that the best known attacks take about 2 basic operations. We chose parameters considered secure under the distinguishing attack in [15], using the method described in [14, Section 5.1] and [6,Section 6]. For the exact details of the security evaluation, we refer to [15,14,6].…”
Section: Choice Of Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…A security level of bits means that the best known attacks take about 2 basic operations. We chose parameters considered secure under the distinguishing attack in [15], using the method described in [14, Section 5.1] and [6,Section 6]. For the exact details of the security evaluation, we refer to [15,14,6].…”
Section: Choice Of Parametersmentioning
confidence: 99%
“…We chose parameters considered secure under the distinguishing attack in [15], using the method described in [14, Section 5.1] and [6,Section 6]. For the exact details of the security evaluation, we refer to [15,14,6]. Security depends on the size of q, σ, and d, and for a given pair q, σ one can determine a lower bound for d.…”
Section: Choice Of Parametersmentioning
confidence: 99%
“…log(q 1 ) = 31 log(q 2 ) = 301 Poly. Degree [29] n > log(q)(λ + 110)/7.2 n n 1 = 1024 This is due to the fact that in the IBM HElib, the need for a chain of moduli required for the noise management leads to a modulus width approximately 10× larger. Since the polynomial degree is directly related to the modulus width by equation (8), this resulted in another 10× growth in the polynomial degree in the IBM HElib.…”
Section: Ctxt Multiplicationmentioning
confidence: 99%
“…The evaluation of the concrete level of security/efficiency offered by SIS and LWE for specific small parameter values still requires careful cryptanalysis, and consideration of the best known attacks. (See, for example, [22,15,9]. )…”
Section: Theorem 2 (Corollary Of Theorem 6)mentioning
confidence: 99%