2015
DOI: 10.1145/2815111.2815158
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic algorithms for LWE problems

Abstract: Abstract. The Learning with Errors (LWE) problem, proposed by Regev in 2005, has become an ever-popular cryptographic primitive, due mainly to its simplicity, flexibility and convincing theoretical arguments regarding its hardness. Among the main proposed approaches to solving LWE instancesnamely, lattice algorithms, combinatorial algorithms, and algebraic algorithms -the last is the one that has received the least attention in the literature, and is the focus of this paper. We present a detailed and refined c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
29
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 27 publications
0
29
0
Order By: Relevance
“…The attack strategy of Ding [47], Arora-Ge [8], and Albrecht-Cid-Faugère-Fitzpatrick-Perret [4] takes subexponential time to break dimension-n LWE with noise width o( √ n), and polynomial time to break LWE with constant noise width. However, these attacks require many LWE samples, whereas typical cryptosystems such as NTRU and NTRU Prime provide far less data to the attacker.…”
Section: Algebraic Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The attack strategy of Ding [47], Arora-Ge [8], and Albrecht-Cid-Faugère-Fitzpatrick-Perret [4] takes subexponential time to break dimension-n LWE with noise width o( √ n), and polynomial time to break LWE with constant noise width. However, these attacks require many LWE samples, whereas typical cryptosystems such as NTRU and NTRU Prime provide far less data to the attacker.…”
Section: Algebraic Attacksmentioning
confidence: 99%
“…Obviously these sizes are not competitive with 256-bit ECC key sizes, but they are small enough for many applications. 4 Streamlined NTRU Prime provides several implementation advantages and security-auditing advantages beyond the NTRU Prime choice of ring: for example, it eliminates the annoying possibility of "decryption failures" that appear in most lattice-based cryptosystems. Our security analysis indicates that Streamlined NTRU Prime 4591 761 actually provides a large security margin beyond our target security level, compensating for potential progress in estimating the actual cost of lattice attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first type is the Arora-Ge algorithm, which was introduced in [6], and then improved in [7]. This type of algorithm is mostly applicable when the noise is too small for Regev's reduction proof to apply [2].…”
Section: Introductionmentioning
confidence: 99%
“…Arora and Ge describe a 2Õ (αq) 2 -time algorithm when q > n to solve the LWE problem [9]. This leads to a subexponential time algorithm when the error magnitude αq is less than √ n. The idea is to transform this system into a noise-free polynomial system and then use root finding algorithms for multivariate polynomials to solve it, using either relinearization in [9] or Gröbner basis in [3]. In this last work, Albrecht et al present an algorithm whose time complexity is 2 (ω+o(1))n log log log n 8 log log n Definition 3.…”
mentioning
confidence: 99%