TY - GEN
T1 - Weak instances of PLWE
AU - Eisenträger, Kirsten
AU - Hallgren, Sean
AU - Lauter, Kristin
N1 - Funding Information:
Sean Hallgren - Partially supported by National Science Foundation awards CCF-0747274 and CCF- 1218721, and by the National Security Agency (NSA) under Army Research Office (ARO) contract number W911NF-12-1-0522. Part of this work was done while visiting Microsoft and MIT.
Funding Information:
Kirsten Eisenträger - Partially supported by National Science Foundation grant DMS-1056703 and by the National Security Agency (NSA) under Army Research Office (ARO) contract number W911NF-12-1-0522. Part of this work was done while the first author was visiting Microsoft, Harvard University and MIT.
Publisher Copyright:
© Springer International Publishing Switzerland 2014.
PY - 2014
Y1 - 2014
N2 - In this paper we present a new attack on the polynomial version of the Ring-LWE assumption, for certain carefully chosen number fields. This variant of RLWE, introduced in [BV11] and called the PLWE assumption, is known to be as hard as the RLWE assumption for 2-power cyclotomic number fields, and for cyclotomic number fields in general with a small cost in terms of error growth. For general number fields, we articulate the relevant properties and prove security reductions for number fields with those properties.We then present an attack on PLWE for number fields satisfying certain properties.
AB - In this paper we present a new attack on the polynomial version of the Ring-LWE assumption, for certain carefully chosen number fields. This variant of RLWE, introduced in [BV11] and called the PLWE assumption, is known to be as hard as the RLWE assumption for 2-power cyclotomic number fields, and for cyclotomic number fields in general with a small cost in terms of error growth. For general number fields, we articulate the relevant properties and prove security reductions for number fields with those properties.We then present an attack on PLWE for number fields satisfying certain properties.
UR - http://www.scopus.com/inward/record.url?scp=84918542453&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84918542453&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-13051-4_11
DO - 10.1007/978-3-319-13051-4_11
M3 - Conference contribution
AN - SCOPUS:84918542453
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 183
EP - 194
BT - Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Revised Selected Papers
A2 - Joux, Antoine
A2 - Youssef, Amr
PB - Springer Verlag
T2 - 21st International Conference on Selected Areas in Cryptography, SAC 2014
Y2 - 14 August 2014 through 15 August 2014
ER -