Verifying solutions to LWE with implications for concrete security

نویسندگان

چکیده

A key step in Regev's (2009) reduction of the Discrete Gaussian Sampling (DGS) problem to that solving Learning With Errors (LWE) is a statistical test required for verifying possible solutions LWE problem. We derive lower bound on success probability leading an upper tightness gap reduction. The depends rejection threshold \begin{document}$ t $\end{document} test. Using particular value id="M2">\begin{document}$ $\end{document}, Regev showed asymptotically, exponentially close one all values error id="M3">\begin{document}$ \alpha\in(0,1) $\end{document}. From concrete analysis point view, used by sub-optimal. It leads considering lattice dimension be as high 400000 obtain somewhat meaningful gap. show using different and id="M4">\begin{document}$ \alpha at most id="M5">\begin{document}$ 1/\sqrt{n} results going 1 small dimension. Consequently, our work shows it may modify parameters asymptotic much improved security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Circular Security Separations for Arbitrary Length Cycles from LWE

We describe a public key encryption that is IND-CPA secure under the Learning with Errors (LWE) assumption, but that is not circular secure for arbitrary length cycles. Previous separation results for cycle length greater than 2 require the use of indistinguishability obfuscation, which is not currently realizable under standard assumptions.

متن کامل

Verifying Security Protocols with Timestamps via Translation to Timed Automata

In this paper we show a general method of proving authentication and integrity of time dependent security protocols by applying powerful model checking tools originally developed for verifying properties of timed automata. Our approach consists in specifying a security protocol, possibly with timestamps, in a higher-level language and translating automatically the specification to a timed autom...

متن کامل

Verifying persistent security properties

We study bisimulation-based information 0ow security properties which are persistent, in the sense that if a system is secure then all of its reachable states are secure too. We show that such properties can be characterized in terms of bisimulation-like equivalence relations, between the full system and the system prevented from performing con3dential actions. Moreover, we provide a characteri...

متن کامل

Verifying Termination of General Logic Programs with Concrete Queries

We introduce a method of verifying termination of logic programs with respect to concrete queries (instead of abstract query patterns). A necessary and sufficient condition is established and an algorithm for automatic verification is developed. In contrast to existing query pattern-based approaches, our method has the following features: (1) It applies to all general logic programs with non-fl...

متن کامل

Verifying qualitative and quantitative properties with LTL over concrete domains

We introduce different extensions of LTL where propositional variables are replaced by constraints interpreted in Z. We show different decidability and complexity results for the satisfiability and model checking problems of these logics. The extension of LTL over a wide set of qualitative constraints is shown to be pspace-complete. When introducing some quantitative constraints, we must consid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics of Communications

سال: 2021

ISSN: ['1930-5346', '1930-5338']

DOI: https://doi.org/10.3934/amc.2020057