Verifying solutions to LWE with implications for concrete security
نویسندگان
چکیده
A key step in Regev's (2009) reduction of the Discrete Gaussian Sampling (DGS) problem to that solving Learning With Errors (LWE) is a statistical test required for verifying possible solutions LWE problem. We derive lower bound on success probability leading an upper tightness gap reduction. The depends rejection threshold \begin{document}$ t $\end{document} test. Using particular value id="M2">\begin{document}$ $\end{document}, Regev showed asymptotically, exponentially close one all values error id="M3">\begin{document}$ \alpha\in(0,1) $\end{document}. From concrete analysis point view, used by sub-optimal. It leads considering lattice dimension be as high 400000 obtain somewhat meaningful gap. show using different and id="M4">\begin{document}$ \alpha at most id="M5">\begin{document}$ 1/\sqrt{n} results going 1 small dimension. Consequently, our work shows it may modify parameters asymptotic much improved security.
منابع مشابه
Circular Security Separations for Arbitrary Length Cycles from LWE
We describe a public key encryption that is IND-CPA secure under the Learning with Errors (LWE) assumption, but that is not circular secure for arbitrary length cycles. Previous separation results for cycle length greater than 2 require the use of indistinguishability obfuscation, which is not currently realizable under standard assumptions.
متن کاملVerifying Security Protocols with Timestamps via Translation to Timed Automata
In this paper we show a general method of proving authentication and integrity of time dependent security protocols by applying powerful model checking tools originally developed for verifying properties of timed automata. Our approach consists in specifying a security protocol, possibly with timestamps, in a higher-level language and translating automatically the specification to a timed autom...
متن کاملVerifying persistent security properties
We study bisimulation-based information 0ow security properties which are persistent, in the sense that if a system is secure then all of its reachable states are secure too. We show that such properties can be characterized in terms of bisimulation-like equivalence relations, between the full system and the system prevented from performing con3dential actions. Moreover, we provide a characteri...
متن کاملVerifying Termination of General Logic Programs with Concrete Queries
We introduce a method of verifying termination of logic programs with respect to concrete queries (instead of abstract query patterns). A necessary and sufficient condition is established and an algorithm for automatic verification is developed. In contrast to existing query pattern-based approaches, our method has the following features: (1) It applies to all general logic programs with non-fl...
متن کاملVerifying qualitative and quantitative properties with LTL over concrete domains
We introduce different extensions of LTL where propositional variables are replaced by constraints interpreted in Z. We show different decidability and complexity results for the satisfiability and model checking problems of these logics. The extension of LTL over a wide set of qualitative constraints is shown to be pspace-complete. When introducing some quantitative constraints, we must consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2021
ISSN: ['1930-5346', '1930-5338']
DOI: https://doi.org/10.3934/amc.2020057