kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Concrete Security from Worst-Case to Average-Case Lattice Reductions
KTH, School of Engineering Sciences (SCI), Mathematics (Dept.), Mathematics (Div.).ORCID iD: 0000-0002-3724-2914
2023 (English)In: Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Proceedings, Springer Nature , 2023, p. 344-369Conference paper, Published paper (Refereed)
Abstract [en]

A famous reduction by Regev shows that random instances of the Learning With Errors (LWE) problem are asymptotically at least as hard as a worst-case lattice problem. As such, by assuming that standard lattice problems are hard to solve, the asymptotic security of cryptosystems based on the LWE problem is guaranteed. However, it has not been clear to which extent, if any, this reduction provides support for the security of present concrete parametrizations. In this work we therefore use Regev’s reduction to parametrize a cryptosystem, providing a reference as to what parameters are required to actually claim security from this reduction. This requires us to account for the concrete performance of this reduction, allowing the first parametrization of a cryptosystem that is provably secure based only on a conservative hardness estimate for a standard lattice problem. Even though we attempt to optimize the reduction, our system still requires significantly larger parameters than typical LWE-based cryptosystems, highlighting the significant gap between parameters that are used in practice and those for which worst-case reductions actually are applicable.

Place, publisher, year, edition, pages
Springer Nature , 2023. p. 344-369
Keywords [en]
Lattice-based cryptography, Learning With Errors, Post-quantum cryptography, Provable security, Public Key Cryptography
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:kth:diva-336746DOI: 10.1007/978-3-031-37679-5_15ISI: 001276584800015Scopus ID: 2-s2.0-85169055866OAI: oai:DiVA.org:kth-336746DiVA, id: diva2:1798412
Conference
14th International Conference on Cryptology in Africa, AFRICACRYPT 2023, Jul 19 2023 - Jul 21, 2023, Sousse, Tunisia
Note

Part of ISBN 9783031376788

QC 20230919

Available from: 2023-09-19 Created: 2023-09-19 Last updated: 2025-05-13Bibliographically approved
In thesis
1.
The record could not be found. The reason may be that the record is no longer available or you may have typed in a wrong id in the address field.

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Gärtner, Joel

Search in DiVA

By author/editor
Gärtner, Joel
By organisation
Mathematics (Div.)
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 25 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf