Back to Search
Start Over
(In)Security of Ring-LWE Under Partial Key Exposure.
- Source :
- Journal of Mathematical Cryptology; 2021, Vol. 15 Issue 1, p72-86, 15p
- Publication Year :
- 2021
-
Abstract
- We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NTT transform of the RLWE secret. (2) Present and implement an efficient key exposure attack that, given certain 1/4-fraction of the coordinates of the NTT transform of the RLWE secret, along with samples from the RLWE distribution, recovers the full RLWE secret for standard parameter settings. (3) Present a search-to-decision reduction for Leaky R-LWE for certain types of key exposure. (4) Propose applications to the security analysis of RLWE-based cryptosystems under partial key exposure. [ABSTRACT FROM AUTHOR]
- Subjects :
- BLOCK ciphers
CRYPTOSYSTEMS
LEAKAGE
HARDNESS
Subjects
Details
- Language :
- English
- ISSN :
- 18622976
- Volume :
- 15
- Issue :
- 1
- Database :
- Complementary Index
- Journal :
- Journal of Mathematical Cryptology
- Publication Type :
- Academic Journal
- Accession number :
- 147152735
- Full Text :
- https://doi.org/10.1515/jmc-2020-0075