2021
DOI: 10.1007/978-3-030-92068-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…Similarly, the key size for our star-specific key-homomorphic PRF family is the same as that of the key-homomorphic PRF family from [35]. Specifically, for security parameter L and 2 L security against known lattice reduction algorithms [11,121,126,128,129,190,231,229,217,216,254,271,272,273,230,257,195,16,46,153,225,224,79], the key size for our star-specific key-homomorphic PRF family is L.…”
Section: Runtime and Key Sizementioning
confidence: 99%
“…Similarly, the key size for our star-specific key-homomorphic PRF family is the same as that of the key-homomorphic PRF family from [35]. Specifically, for security parameter L and 2 L security against known lattice reduction algorithms [11,121,126,128,129,190,231,229,217,216,254,271,272,273,230,257,195,16,46,153,225,224,79], the key size for our star-specific key-homomorphic PRF family is L.…”
Section: Runtime and Key Sizementioning
confidence: 99%
“…In [GJ21] further improvements were presented. In particular, the search over s 1 is realised using a Fast Fourier Transform style algorithm and the search space is significantly reduced by roughly considering only the most significant bits of s 1 .…”
Section: We Define Two Problemsmentioning
confidence: 99%
“…Up until recently, dual attacks were generally considered less efficient for secrets s drawn from a sufficiently wide distribution. Recent developments [GJ21,MAT22] of dual attacks, however, have shown their ability to surpass primal attacks. These performance improvements are derived from combining lattice reduction on the scaled dual of a target lattice with an exhaustive search on a space related to the underlying secret s. Roughly speaking, spending more resources on the exhaustive search part allows us to spend fewer resources on the lattice reduction part of the overall algorithm and vice versa.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Martin [1] propose a re-randomization and smaller-dimensional lattice reduction method, and investigate the method for generating coefficients of short vectors in the dual attack. Guo and Thomas [58] show that the current security estimates from the primal attacks are overestimated. Espitau et al [50] achieve a dual attack that outperforms the primal attack.…”
Section: Recent Advances On Dual Attackmentioning
confidence: 99%