Provably weak instances of Ring-LWE

The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but h...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Elias, Yara, Lauter, Kristin E, Ozman, Ekin, Stange, Katherine E
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Elias, Yara
Lauter, Kristin E
Ozman, Ekin
Stange, Katherine E
description The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus. Our attack is based on the attack on Poly-LWE which was presented in [Eisentr\"ager-Hallgren-Lauter]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-$2$ cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.
doi_str_mv 10.48550/arxiv.1502.03708
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1502_03708</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1502_03708</sourcerecordid><originalsourceid>FETCH-LOGICAL-a678-13698dca8230408eacf873ea8ae6d1bba9acfb80e42ff0fdc40ec4588aa558403</originalsourceid><addsrcrecordid>eNotzksLgkAUhuHZtAjrB7RKaK0dnRk9LiO6gVCE0FKO40xIpqFh-e-7rj54Fx8PYxMPXIFSwpyaZ9G5ngTfBR4CDtns0NQdZWVvPzRd7KJq71Qp3dq1sY9FdXbi02rEBobKVo__a7FkvUqWWyfeb3bLRexQEKLj8SDCXBH6HASgJmUw5JqQdJB7WUbRu2QIWvjGgMmVAK2ERCSSEgVwi01_t19lemuKKzV9-tGmXy1_AV6zOUg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Provably weak instances of Ring-LWE</title><source>arXiv.org</source><creator>Elias, Yara ; Lauter, Kristin E ; Ozman, Ekin ; Stange, Katherine E</creator><creatorcontrib>Elias, Yara ; Lauter, Kristin E ; Ozman, Ekin ; Stange, Katherine E</creatorcontrib><description>The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus. Our attack is based on the attack on Poly-LWE which was presented in [Eisentr\"ager-Hallgren-Lauter]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-$2$ cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.</description><identifier>DOI: 10.48550/arxiv.1502.03708</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Mathematics - Number Theory</subject><creationdate>2015-02</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1502.03708$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1502.03708$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Elias, Yara</creatorcontrib><creatorcontrib>Lauter, Kristin E</creatorcontrib><creatorcontrib>Ozman, Ekin</creatorcontrib><creatorcontrib>Stange, Katherine E</creatorcontrib><title>Provably weak instances of Ring-LWE</title><description>The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus. Our attack is based on the attack on Poly-LWE which was presented in [Eisentr\"ager-Hallgren-Lauter]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-$2$ cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.</description><subject>Computer Science - Cryptography and Security</subject><subject>Mathematics - Number Theory</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzksLgkAUhuHZtAjrB7RKaK0dnRk9LiO6gVCE0FKO40xIpqFh-e-7rj54Fx8PYxMPXIFSwpyaZ9G5ngTfBR4CDtns0NQdZWVvPzRd7KJq71Qp3dq1sY9FdXbi02rEBobKVo__a7FkvUqWWyfeb3bLRexQEKLj8SDCXBH6HASgJmUw5JqQdJB7WUbRu2QIWvjGgMmVAK2ERCSSEgVwi01_t19lemuKKzV9-tGmXy1_AV6zOUg</recordid><startdate>20150212</startdate><enddate>20150212</enddate><creator>Elias, Yara</creator><creator>Lauter, Kristin E</creator><creator>Ozman, Ekin</creator><creator>Stange, Katherine E</creator><scope>AKY</scope><scope>AKZ</scope><scope>GOX</scope></search><sort><creationdate>20150212</creationdate><title>Provably weak instances of Ring-LWE</title><author>Elias, Yara ; Lauter, Kristin E ; Ozman, Ekin ; Stange, Katherine E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a678-13698dca8230408eacf873ea8ae6d1bba9acfb80e42ff0fdc40ec4588aa558403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Mathematics - Number Theory</topic><toplevel>online_resources</toplevel><creatorcontrib>Elias, Yara</creatorcontrib><creatorcontrib>Lauter, Kristin E</creatorcontrib><creatorcontrib>Ozman, Ekin</creatorcontrib><creatorcontrib>Stange, Katherine E</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Mathematics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Elias, Yara</au><au>Lauter, Kristin E</au><au>Ozman, Ekin</au><au>Stange, Katherine E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Provably weak instances of Ring-LWE</atitle><date>2015-02-12</date><risdate>2015</risdate><abstract>The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus. Our attack is based on the attack on Poly-LWE which was presented in [Eisentr\"ager-Hallgren-Lauter]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-$2$ cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.</abstract><doi>10.48550/arxiv.1502.03708</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1502.03708
ispartof
issn
language eng
recordid cdi_arxiv_primary_1502_03708
source arXiv.org
subjects Computer Science - Cryptography and Security
Mathematics - Number Theory
title Provably weak instances of Ring-LWE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T12%3A44%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Provably%20weak%20instances%20of%20Ring-LWE&rft.au=Elias,%20Yara&rft.date=2015-02-12&rft_id=info:doi/10.48550/arxiv.1502.03708&rft_dat=%3Carxiv_GOX%3E1502_03708%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true