### 抜粋

The typical approach in attacking an LWR _{m,n,q,p(χs)} instance parameterized by four integers m, n, q, p (Formula Presented) and a probability distribution χs is just by simply regarding it as a Learning with Errors (LWE) modulo q instance and then trying to adapt known LWE attacks to this LWE instance. In this paper, we show that for an LWR _{m,n,q,p(χs)} instance whose parameters satisfy a certain sufficient condition, one can use the BDD strategy to recover the secret with higher advantages if one transforms the LWR instance to an LWE modulo (Formula Presented) instance with (Formula Presented) chosen appropriately instead of an LWE modulo q instance. The optimal modulus q used in our BDD attack is quite close to p as well as typically smaller than q. Especially, our experiments confirm that our BDD attack is much better in solving search-LWR in terms of root Hermite factor, success probability and even running time either in case the ratio log (q)/log (p) is big or/and the dimension n is sufficiently large.

元の言語 | 英語 |
---|---|

ホスト出版物のタイトル | Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings |

編集者 | Panos Papadimitratos, Jan Camenisch |

出版者 | Springer Verlag |

ページ | 357-376 |

ページ数 | 20 |

ISBN（印刷物） | 9783030004330 |

DOI | |

出版物ステータス | 出版済み - 1 1 2018 |

イベント | 17th International Conference on Cryptology and Network Security, CANS 2018 - Naples, イタリア 継続期間: 9 30 2018 → 10 3 2018 |

### 出版物シリーズ

名前 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

巻 | 11124 LNCS |

ISSN（印刷物） | 0302-9743 |

ISSN（電子版） | 1611-3349 |

### その他

その他 | 17th International Conference on Cryptology and Network Security, CANS 2018 |
---|---|

国 | イタリア |

市 | Naples |

期間 | 9/30/18 → 10/3/18 |

### All Science Journal Classification (ASJC) codes

- Theoretical Computer Science
- Computer Science(all)

## フィンガープリント Solving LWR via BDD strategy: Modulus switching approach' の研究トピックを掘り下げます。これらはともに一意のフィンガープリントを構成します。

## これを引用

*Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings*(pp. 357-376). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11124 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-00434-7_18