Lossiness and Entropic Hardness for Ring-LWE

被引:12
|
作者
Brakerski, Zvika [1 ]
Doettling, Nico [2 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
来源
基金
美国国家科学基金会; 欧盟地平线“2020”;
关键词
D O I
10.1007/978-3-030-64375-1_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The hardness of the Ring Learning with Errors problem (RLWE) is a central building block for efficiency-oriented lattice-based cryptography. Many applications use an "entropic" variant of the problem where the so-called "secret" is not distributed uniformly as prescribed but instead comes from some distribution with sufficient minentropy. However, the hardness of the entropic variant has not been sub-stantiated thus far. For standard LWE (not over rings) entropic results are known, using a "lossiness approach" but it was not known how to adapt this approach to the ring setting. In this work we present the first such results, where entropic security is established either under RLWE or under the Decisional Small Polynomial Ratio (DSPR) assumption which is a mild variant of the NTRU assumption. In the context of general entropic distributions, our results in the ring setting essentially match the known lower bounds (Bolboceanu et al., Asiacrypt 2019; Brakerski and Dottling, Eurocrypt 2020).
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [21] Consideration on Defining Field for Efficient Ring-LWE
    Yamada, Rintaro
    Okumura, Shinya
    Miyaji, Atsuko
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 25 - 32
  • [22] Trapdoor function based on the Ring-LWE and applications in communications
    Zhang, Chengli
    Ma, Wenping
    Zhao, Feifei
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1821 - 1827
  • [23] Revisiting an Extension of Kannan's Embedding for Ring-LWE
    Uesugi, Satoshi
    Okumura, Shinya
    Miyaji, Atsuko
    MOBILE INTERNET SECURITY, MOBISEC 2023, 2024, 2095 : 167 - 180
  • [24] Trapdoor function based on the Ring-LWE and applications in communications
    Chengli Zhang
    Wenping Ma
    Feifei Zhao
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1821 - 1827
  • [25] A New Secure Matrix Multiplication from Ring-LWE
    Wang, Lihua
    Aono, Yoshinori
    Phong, Le Trieu
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 93 - 111
  • [26] (In)Security of Ring-LWE Under Partial Key Exposure
    Dachman-Soled, Dana
    Gong, Huijing
    Kulkarni, Mukul
    Shahverdi, Aria
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 72 - 86
  • [27] Ring-LWE on 8-Bit AVR Embedded Processor
    Seo, Hwajeong
    Kwon, Hyeokdong
    Kwon, Yongbeen
    Kim, Kyungho
    Choi, Seungju
    Kim, Hyunjun
    Jang, Kyoungbae
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 315 - 327
  • [28] Obfuscating Conjunctions under Entropic Ring LWE
    Brakerski, Zvika
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    Wichs, Daniel
    ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, : 147 - 156
  • [29] Ring-LWE Based Face Encryption and Decryption System on a GPU
    Tan, Tuy Nguyen
    Hyun, Yujin
    Kim, Jisu
    Choi, Dongwoo
    Lee, Hanho
    2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2019, : 15 - 16
  • [30] CNC: A lightweight architecture for Binary Ring-LWE based PQC
    Ahmadunnisa, Shaik
    Mathe, Sudha Ellison
    MICROPROCESSORS AND MICROSYSTEMS, 2024, 106