JAIST Repository >
b. 情報科学研究科・情報科学系 >
b11. 会議発表論文・発表資料等 >
b11-1. 会議発表論文・発表資料 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/16195
|
タイトル: | An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields |
著者: | Terada, Shota Nakano, Hideto Okumura, Shinya Miyaji, Atsuko |
発行日: | 2018-10 |
出版者: | Institute of Electrical and Electronics Engineers (IEEE) |
誌名: | 2018 International Symposium on Information Theory and Its Applications (ISITA) |
開始ページ: | 306 |
終了ページ: | 310 |
DOI: | 10.23919/ISITA.2018.8664308 |
抄録: | The ring variant of learning with errors (Ring-LWE) problem has provided efficient post-quantum cryptographic schemes including homomorphic encryption (HE) schemes. Usually, cyclotomic fields are used as underlying number fields of Ring-LWE from the viewpoints of efficiency and security. However, especially in the case of HE schemes, improving the efficiency and ensuring the security are important tasks even now. Arita and Handa proposed to use decomposition fields as underlying number fields of Ring-LWE and successfully constructed a HE scheme which can encrypt many plaintexts efficiently at a time. However, there is no enough evidence that decomposition fields do not provide weak Ring-LWE instances.In this paper, we give an experimental analysis on lattice attacks against Ring-LWE over decomposition fields. More precisely, we conducted lattice attacks against Ring-LWE over decomposition fields and over the ℓ-th cyclotomic fields with some prime numbers ℓ, respectively, and compared each of the running-time, the success rate and the root hermite factor. We also compared the results of the same attacks on various decomposition fields to find decomposition fields providing weak Ring-LWE instances. As a result of our analysis, we expect that decomposition fields would provide more secure and efficient HE schemes based on Ring-LWE compared to the ℓ-th cyclotomic fields. |
Rights: | Copyright (C)2018 IEICE. Shota Terada, Hideto Nakano, Shinya Okumura, Atsuko Miyaji, 2018 International Symposium on Information Theory and Its Applications (ISITA), 2018, pp.306-310. http://dx.doi.org/10.23919/ISITA.2018.8664308 |
URI: | http://hdl.handle.net/10119/16195 |
資料タイプ: | publisher |
出現コレクション: | b11-1. 会議発表論文・発表資料 (Conference Papers)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
3048.pdf | | 250Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|