2014
DOI: 10.1007/978-3-319-08344-5_21
|View full text |Cite
|
Sign up to set email alerts
|

Lattice Decoding Attacks on Binary LWE

Abstract: Abstract. We consider the binary-LWE problem, which is the learning with errors problem when the entries of the secret vector are chosen from {0, 1} or {−1, 0, 1} (and the error vector is sampled from a discrete Gaussian distribution). Our main result is an improved lattice decoding algorithm for binary-LWE which first translates the problem to the inhomogeneous short integer solution (ISIS) problem, and then solves the closest vector problem using a re-scaling of the lattice. We also discuss modulus switching… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
19
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 24 publications
(49 reference statements)
3
19
0
1
Order By: Relevance
“…However, the vector v v v = (s s s, e e e, 1) is unbalanced since ||s s s i || is not necessarily equal to ||e e e i ||. In our case, ||s s s i || < ||e e e i ||, which can be exploited by the lattice rescaling method described by Bai et al [9], and further analysed in [22]. Analogous to [4], the primal attack is successful if the projected norm of the unique shortest vector on the last b Gram-Schmidt vectors is shorter than the (d − b) th Gram-Schmidt vector, or: is generated uniformly, z will also be uniform mod q.…”
Section: Security Analysismentioning
confidence: 96%
See 1 more Smart Citation
“…However, the vector v v v = (s s s, e e e, 1) is unbalanced since ||s s s i || is not necessarily equal to ||e e e i ||. In our case, ||s s s i || < ||e e e i ||, which can be exploited by the lattice rescaling method described by Bai et al [9], and further analysed in [22]. Analogous to [4], the primal attack is successful if the projected norm of the unique shortest vector on the last b Gram-Schmidt vectors is shorter than the (d − b) th Gram-Schmidt vector, or: is generated uniformly, z will also be uniform mod q.…”
Section: Security Analysismentioning
confidence: 96%
“…Since in our case, ||s s s i || < ||e e e i ||, we observe that the w w ws s s term will be smaller than the v v ve e e term. The weighted attack [9,22] optimizes the shortest vector so that these terms have a similar variance, by considering the weighted lattice Λ = {(x x x, y y y ) ∈ Z m × (α −1 Z) n : (x x x, αy y y ) ∈ Λ mod q}.…”
Section: Security Analysismentioning
confidence: 99%
“…Our method for solving LWE is via embedding e into a uSVP instance [Kan87,BG14] but using the success condition originally given in [ADPS16] and experimentally justified in [AGVW17]. We also use the embedding coefficient t = 1 following [ADPS16,AGVW17].…”
Section: Lwementioning
confidence: 99%
“…Once α and p are chosen, we select the remaining parameters q and n in order to achieve the desired level of security for the LWE encoding scheme. To do so, we take advantage of Albrecht's estimator 7 [APS15] which, as of now, covers the following attacks: meet-in-the-middle exhaustive search, coded-BKW [GJS15], dual-lattice attack and small/sparse secret variant [Alb17], lattice reduction with enumeration [LP11], primal attack via uSVP [AFG14,BG14], Arora-Ge algorithm [AG11] using Gröbner bases [ACFP14]. Some possible choices of parameters are reported in Table 1.…”
Section: Efficiency and Concrete Parametersmentioning
confidence: 99%