2020
DOI: 10.1007/978-3-030-44223-1_16
|View full text |Cite
|
Sign up to set email alerts
|

COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…, then L ≤ 2 bits of security are lost overall for our finite arithmetic precision p f p LATTE implementation versus the infinite precision implementation. To compute B T ≤ B M Z , we use the RD bound B on the COSAC Z sampler RD from the ideal Z sampler distribution derived in [21] corresponding to the COSAC sampler precision p D used in our COSAC implementation (see Sec. V-B for the discussions).…”
Section: Statistical Model For Ffsampling Precisionmentioning
confidence: 99%
See 2 more Smart Citations
“…, then L ≤ 2 bits of security are lost overall for our finite arithmetic precision p f p LATTE implementation versus the infinite precision implementation. To compute B T ≤ B M Z , we use the RD bound B on the COSAC Z sampler RD from the ideal Z sampler distribution derived in [21] corresponding to the COSAC sampler precision p D used in our COSAC implementation (see Sec. V-B for the discussions).…”
Section: Statistical Model For Ffsampling Precisionmentioning
confidence: 99%
“…Then, we discuss the integer discrete Gaussian sampling techniques in Sec. V-B, including the adoption of FACCT [19] and COSAC [20], [21] samplers in our LATTE implementation.…”
Section: Id-ow-cpa Security Of Improved Lattementioning
confidence: 99%
See 1 more Smart Citation
“…Verifiable encryption needs to sample vectors according to a discrete Gaussian distribution. For an R q element with standard deviation σ E ≈ 2 15.7 (for the encryption scheme), the implementation from COSAC [ZSS20] made available for σ = 2 17 samples 1024 integers in 0.12 ms using very small precomputation tables. Each encryption iteration takes 69 ms and, because we expect to need 3 attempts to generate one valid encryption (line 8 in Figure 3), the total time of encryption is around 208 ms. For verification, 39 ms are necessary to execute a test; and 6 ms are required for the actual decryption.…”
Section: Timingsmentioning
confidence: 99%
“…e noise with normal distribution makes the model have many elegant mathematical properties. Although the discrete Laplace noise mechanism and the discrete Gaussian noise mechanism cannot be compared in the same model, since they are used in different privacy mechanisms, we are still willing to use the discrete Gaussian noise in order to obtain aesthetic mathematical conclusions [10][11][12][13].…”
Section: Discrete Gaussianmentioning
confidence: 99%