2016
DOI: 10.1112/s1461157016000371
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero

Abstract: Let f and g be polynomials of a bounded Euclidean norm in the ring Z[X]/ X n + 1 . Given the polynomial [f /g]q ∈ Zq[X]/ X n + 1 , the NTRU problem is to find a, b ∈ Z[X]/ X n + 1 with a small Euclidean norm such that [a/b]We propose an algorithm to solve the NTRU problem, which runs in 2 O(log 2 λ) time when g , f , and g −1 are within some range. The main technique of our algorithm is the reduction of a problem on a field to one on a subfield. The GGH scheme, the first candidate of an (approximate) multiline… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(30 citation statements)
references
References 19 publications
0
30
0
Order By: Relevance
“…The NTRU algorithm [14][15][16] is an open secret system invented by three professors of mathematics at Brown University in 1996. It is a cryptosystem based on polynomial rings, and its security depends on the shortest vector problem (SVP).…”
Section: Description Of the Ntru Algorithmmentioning
confidence: 99%
“…The NTRU algorithm [14][15][16] is an open secret system invented by three professors of mathematics at Brown University in 1996. It is a cryptosystem based on polynomial rings, and its security depends on the shortest vector problem (SVP).…”
Section: Description Of the Ntru Algorithmmentioning
confidence: 99%
“…More recently, Albrecht, Bai, and Ducas [1] gave a quantum break for GGHLite without using any encodings of 0 or the public zero-testing parameter. Subsequently, Cheon, Jeong, and Lee [17] showed how to give a (classical) polynomial-time attack on GGHLite, again without using any encodings of 0. However, their attack re-quires exponential time if the parameters of GGHLite are sufficiently increased (by a polynomial amount).…”
Section: The Gghlite Multilinear Mapmentioning
confidence: 99%
“…However, the dimension of the cyclotomic ring used in current instantiations on the GGH multilinear map is chosen to be at least λ 2 where λ is the security parameter. This is done to thwart the attacks of [ABD16,CJL16,KF17] over the GGH13 multilinear map, but it also means that the classical variant of the attack described in this article is exponential in the security parameter, even when using the sub-exponential principal ideal solver of [BEF + 17]. It is still interesting to note that any future improvement for solving the principal ideal problem will directly imply an improvement for the attack described in this article.…”
Section: Introductionmentioning
confidence: 99%