CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Impact of the modulus switching technique on some attacks against learning problems
Authors
Dung Hoang Duong
Koha Kinjo
+4 more
Quoc Huy Le
Pradeep Mishra
Satoshi Nakamura
Masaya Yasuda
Publication date
1 January 2020
Publisher
'Sociological Research Online'
Abstract
© The Institution of Engineering and Technology 2019. The modulus switching technique has been used in some cryptographic applications as well as in cryptanalysis. For cryptanalysis against the learning with errors (LWE) problem and the learning with rounding (LWR) problem, it seems that one does not know whether the technique is really useful or not. This work supplies a complete view of the impact of this technique on the decoding attack, the dual attack and the primal attack against both LWE and LWR. For each attack, the authors give the optimal formula for the switching modulus. The formulas get involved the number of LWE/LWR samples, which differs from the known formula in the literature. They also attain the corresponding sufficient conditions saying when one should utilise the technique. Surprisingly, restricted to the LWE/LWR problem that the secret vector is much shorter than the error vector, they also show that performing the modulus switching before using the so-called rescaling technique in the dual attack and the primal attack make these attacks worse than only exploiting the rescaling technique as reported by Bai and Galbraith at the Australasian conference on information security and privacy (ACISP) 2014 conference. As an application, they theoretically assess the influence of the modulus switching on the LWE/LWR-based second round NIST PQC submissions
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
Research Online
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:ro.uow.edu.au:eispapers1-4...
Last time updated on 04/06/2020
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
Last time updated on 01/05/2021