Back to Search Start Over

(In)Security of Ring-LWE Under Partial Key Exposure.

Authors :
Dachman-Soled, Dana
Gong, Huijing
Kulkarni, Mukul
Shahverdi, Aria
Source :
Journal of Mathematical Cryptology; 2021, Vol. 15 Issue 1, p72-86, 15p
Publication Year :
2021

Abstract

We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NTT transform of the RLWE secret. (2) Present and implement an efficient key exposure attack that, given certain 1/4-fraction of the coordinates of the NTT transform of the RLWE secret, along with samples from the RLWE distribution, recovers the full RLWE secret for standard parameter settings. (3) Present a search-to-decision reduction for Leaky R-LWE for certain types of key exposure. (4) Propose applications to the security analysis of RLWE-based cryptosystems under partial key exposure. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
18622976
Volume :
15
Issue :
1
Database :
Complementary Index
Journal :
Journal of Mathematical Cryptology
Publication Type :
Academic Journal
Accession number :
147152735
Full Text :
https://doi.org/10.1515/jmc-2020-0075