Cryptography Reference
In-Depth Information
Example 19.7.2 Table 3 of Micciancio and Regev [ 379 ] suggests the parameters
( n,m,q,σ )
=
(233 , 4536 , 32749 , 2 . 8) .
Lindner and Peikert [ 352 ] suggest (using Figure 4 and the condition m
2 n
+
with
=
128)
( n,m,q,σ )
=
(256 , 640 , 4093 , 3 . 3) .
Exercise 19.7.3 Show that if one can determine e then one can solve LWE efficiently.
Exercise 19.7.4
Show that, when q is prime, LWE
R DLWE. Show that DLWE
R
LWE.
We now briefly sketch two lattice attacks on LWE. These attacks can be avoided by
taking appropriate parameters. For other attacks on LWE see [ 446 ].
Example 19.7.5 (Lattice attack on DLWE using short vectors in kernel lattice modulo q .)
Suppose one can find a short vector w in the lattice
w
0 (mod q ) .
m : w A
∈ Z
Then wc
we (mod q ). If w is short enough then one might expect that
we is a small integer. On the other hand, if c is independent of A then wc (mod q )isa
random integer modulo q . Hence, one might be able to distinguish the LWE distribution
from the uniform distribution using short enough vectors w .
Note that one is not obliged to use all the rows of A in this attack, and so one can replace
m by a much smaller value m . For analysis of the best value for m , and for parameters
that resist this attack, see Section 5.4.1 (especially equation (10)) of [ 379 ].
=
w A s
+
we
Example 19.7.6 (Reducing LWE to CVP.) We now consider a natural approach to solving
LWE using lattices. Since we always use row lattices, it is appropriate to take the transpose
of LWE. Hence, suppose c , s and e are row vectors (of lengths m , n and m respectively)
such that c
s A T
e (mod q ).
Consider the lattice
=
+
= v
n .
m : v
u A T (mod q )forsome u
∈ Z
∈ Z
L
Then L has rank m and a basis matrix for it is computed by taking the (row) Hermite normal
form of the ( n
+
m )
×
m matrix
A T
qI m
where I m is an m
×
m identity matrix. One then tries to find an element v of L that is close
s A T (mod q ).
to c . Hopefully, v
=
c
e
Search WWH ::




Custom Search