2018
DOI: 10.1007/978-3-319-98113-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(47 citation statements)
references
References 24 publications
0
44
0
Order By: Relevance
“…However, the vector v v v = (s s s, e e e, 1) is unbalanced since ||s s s i || is not necessarily equal to ||e e e i ||. In our case, ||s s s i || < ||e e e i ||, which can be exploited by the lattice rescaling method described by Bai et al [9], and further analysed in [22]. Analogous to [4], the primal attack is successful if the projected norm of the unique shortest vector on the last b Gram-Schmidt vectors is shorter than the (d − b) th Gram-Schmidt vector, or: is generated uniformly, z will also be uniform mod q.…”
Section: Security Analysismentioning
confidence: 89%
See 1 more Smart Citation
“…However, the vector v v v = (s s s, e e e, 1) is unbalanced since ||s s s i || is not necessarily equal to ||e e e i ||. In our case, ||s s s i || < ||e e e i ||, which can be exploited by the lattice rescaling method described by Bai et al [9], and further analysed in [22]. Analogous to [4], the primal attack is successful if the projected norm of the unique shortest vector on the last b Gram-Schmidt vectors is shorter than the (d − b) th Gram-Schmidt vector, or: is generated uniformly, z will also be uniform mod q.…”
Section: Security Analysismentioning
confidence: 89%
“…Since in our case, ||s s s i || < ||e e e i ||, we observe that the w w ws s s term will be smaller than the v v ve e e term. The weighted attack [9,22] optimizes the shortest vector so that these terms have a similar variance, by considering the weighted lattice Λ = {(x x x, y y y ) ∈ Z m × (α −1 Z) n : (x x x, αy y y ) ∈ Λ mod q}.…”
Section: Security Analysismentioning
confidence: 99%
“…For the convenience of calculations, we only sample and compute integers over Z . [15] is parameterized by positive integers ℎ, , , , , , ∈ Z and an error rate ∈ R, where the moduli , , satisfy | | . For a real number 0 < < 1, we sample values (…”
Section: Binomial Distributionmentioning
confidence: 99%
“…We implemented and tested five recent lattice-based encryption schemes and public-key exchange protocols on four web browsers, a microcontroller Tessel2, an Android phone Xperia XZ, and other JavaScript-enabled platforms on PC and Mac. We chose an encryption scheme "Lizard" which is based on the learning with errors (LWE) and the learning with rounding (LWR) problems and its ring variant "ring-Lizard" [15], a modulo-LWE based encryption scheme "Kyber" [16], and two quantum secure key exchange protocols "Frodo" [17] and "NewHope" [18], which are based on the LWE problem and the ring-LWE problem, respectively. All the cryptosystems above were implemented in JavaScript.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation