2019
DOI: 10.1007/978-3-030-10970-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Error-Correcting Codes for Lattice-Based Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(50 citation statements)
references
References 14 publications
0
50
0
Order By: Relevance
“…But, designing schemes with negligible decryption failures while also guaranteeing high security could impose a significant penalty over performance. Fritzmann et al [FPS18] performed a systematic study of utilizing forward error correcting codes to artificially reduce decryption failures by correcting errors in the decrypted message. The message m to be encrypted is first input to the ECC's encoding procedure to create a codeword c. This codeword is subsequently encrypted to generate the ciphertext ct.…”
Section: Error Correcting Codes In Lwe/lwr-based Schemesmentioning
confidence: 99%
“…But, designing schemes with negligible decryption failures while also guaranteeing high security could impose a significant penalty over performance. Fritzmann et al [FPS18] performed a systematic study of utilizing forward error correcting codes to artificially reduce decryption failures by correcting errors in the decrypted message. The message m to be encrypted is first input to the ECC's encoding procedure to create a codeword c. This codeword is subsequently encrypted to generate the ciphertext ct.…”
Section: Error Correcting Codes In Lwe/lwr-based Schemesmentioning
confidence: 99%
“…random variables following the centered binomial distribution. However, since it is difficult to calculate the multiple convolutions of the above distribution in closed form, the distribution of difference noise is numerically calculated [13].…”
Section: Analysis Of Encoding/modulation and Decoding/demodulation Anmentioning
confidence: 99%
“…where A i = m−1 l=0 α i+256l y m k,l and A i is fully determined by n * t,i , n * t,i+256 , n * t,i+512 , and n * t,i+768 for n = 1024 or by n * t,i and n * t,i+256 for n = 512, and |A i | < mα max where α max = (2nk 2 + k + (q − 1)/r)/q . There are two constraints in (13) such that A i is a finite integer and m−1 l=0 n * t,i+256l and β are congruent modulo q. Thus, E k can be expressed as union of supports satisfying two constraints on n * t,i and α i as follows:…”
Section: Propose Upper Bound On Ber Of Newhopementioning
confidence: 99%
See 1 more Smart Citation
“…To reduce the failure rate, some schemes utilize error correcting codes (ECC) to make the decryption resilient against a certain number of errors. The NIST candidate LAC [14] relies on extensive error correction, and Fritzmann et al [6] made a study on the positive impact of the usage of ECC's on the security and bandwidth of lattice-based schemes. Another possibility is to eliminate decryption failures altogether and thus eliminate attacks that exploit them, by selecting the parameter of the scheme accordingly.…”
Section: Introductionmentioning
confidence: 99%