2023
DOI: 10.1109/tifs.2022.3226907
|View full text |Cite
|
Sign up to set email alerts
|

Information- and Coding-Theoretic Analysis of the RLWE/MLWE Channel

Abstract: Several cryptosystems based on the Ring Learning with Errors (RLWE) problem have been proposed within the NIST post-quantum cryptography standardization process, e.g., NewHope. Furthermore, there are systems like Kyber which are based on the closely related MLWE assumption. Both previously mentioned schemes result in a non-zero decryption failure rate (DFR). The combination of encryption and decryption for these kinds of algorithms can be interpreted as data transmission over a noisy channel. To the best of ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…In addition, the BDOP-PEKS, VSEF, and Zhang et al schemes all rely on bilinear mapping operations, which cannot resist quantum attacks. In contrast, our VR-PEKS scheme is constructed based on the fully homomorphic encryption BFV, which is based on the RLWE hard problem and is able to resist quantum attacks [39].…”
Section: Security Comparisonmentioning
confidence: 99%
“…In addition, the BDOP-PEKS, VSEF, and Zhang et al schemes all rely on bilinear mapping operations, which cannot resist quantum attacks. In contrast, our VR-PEKS scheme is constructed based on the fully homomorphic encryption BFV, which is based on the RLWE hard problem and is able to resist quantum attacks [39].…”
Section: Security Comparisonmentioning
confidence: 99%