2020
DOI: 10.2140/obs.2020.4.251
|View full text |Cite
|
Sign up to set email alerts
|

The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…As a Hash-and-Sign paradigm signature, forging a signature stems to feeding a lattice point v at a bounded distance from a random space point x. This ApproxCVP problem can be solved using the so-called Nearest-Cospace framework developed in [17]. Under the Geometric Series assumption, Theorem 3.3 of [17] states that under the condition:…”
Section: G1 Key Recovery Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…As a Hash-and-Sign paradigm signature, forging a signature stems to feeding a lattice point v at a bounded distance from a random space point x. This ApproxCVP problem can be solved using the so-called Nearest-Cospace framework developed in [17]. Under the Geometric Series assumption, Theorem 3.3 of [17] states that under the condition:…”
Section: G1 Key Recovery Attackmentioning
confidence: 99%
“…This ApproxCVP problem can be solved using the so-called Nearest-Cospace framework developed in [17]. Under the Geometric Series assumption, Theorem 3.3 of [17] states that under the condition:…”
Section: G1 Key Recovery Attackmentioning
confidence: 99%
“…Since we are quite above λ 1 (L NTRU )/2, this is an instance of the Approximate Closest Vector Problem (ApproxCVP). This problem can be solved using the so-called Nearest-Cospace framework developed by Espitau and Kirchner in [16]. Under the Geometric Series assumption, Theorem 3.3 of [16] states that the decoding can be done in time Poly(d) calls to a cvp oracle in dimension β under the condition…”
Section: Security Analysismentioning
confidence: 99%
“…For bigger values of t, one has to find a balance between the time complexity of the CVP algorithm and the distance c − e i+1 , closely related to the time complexity of the operation [a i • b] • E i+1 . This could be done with Espitau and Kirchner's algorithm [25], leading to a subexponential attack of time complexity L t [1/2, c] = exp((c + o(1)) t log(t)), with c 0.229 (see Appendix B). To reach a security level of 128 bits would require to take t ≥ 3 • 10 4 , which is unrealistic.…”
Section: Inverting the Class Group Action On Descending Chainsmentioning
confidence: 99%