2016
DOI: 10.1007/978-3-319-31517-1_2
|View full text |Cite
|
Sign up to set email alerts
|

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
37
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(37 citation statements)
references
References 27 publications
0
37
0
Order By: Relevance
“…A theoretical analysis of the hybrid attack was given in [12]. Furthermore, an application of the hybrid attack to binary LWE was analyzed in [8]. About the success probability, theoretical analysis with additional assumption is given in [12] and [8] but lack of experimental verification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A theoretical analysis of the hybrid attack was given in [12]. Furthermore, an application of the hybrid attack to binary LWE was analyzed in [8]. About the success probability, theoretical analysis with additional assumption is given in [12] and [8] but lack of experimental verification.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, an application of the hybrid attack to binary LWE was analyzed in [8]. About the success probability, theoretical analysis with additional assumption is given in [12] and [8] but lack of experimental verification. In addition, Wunderer [22] pointed out the overestimate of lattice-based cryptosystems derived from the flawed analysis due to roughly simplifying the assumptions in the hybrid attack.…”
Section: Related Workmentioning
confidence: 99%
“…Another class of secret key cryptographic schemes that have so far withstood quantum attacks are based on the learning with errors (LWE) problem (see, for example, [4,8,17,19]). It has recently been shown that the hybrid attack applies to LWE with binary error as well [5]. This paper shows that the storage capacity is not as unambiguous as portrayed in [14] and reduced-memory variation of the attack should be taken into account for parameter considerations of NTRU and LWE-based schemes.…”
mentioning
confidence: 92%
“…On the other hand, we do not have provable security on our particular structure, but neither does NTRU; although NTRU has been researched intensively for quite some time now. Another motivation to follow an alternative path of study from LWE-based cryptosystems (and q-ary lattices) is the recent progress of attacks on such cryptosystems [3,5,13,38,39,41] and the recent talk given by Lyubashevsky at PKC'16 in which he also qualifies LWE-based problems as particular instances of "basic" lattice problems and advised "to understand the underlying knapsack problems" to build practical schemes [47].…”
Section: Introductionmentioning
confidence: 99%