BKZ 2.0: Better lattice security estimates. The best lattice reduction algorithm known in practice for high dimension is Schnorr-Euchner’s BKZ: all security estimates of lattice cryptosystems are based on NTL’s old implementation of BKZ. However, recent progress on lattice enumeration suggests that BKZ and its NTL implementation are no longer optimal, but the precise impact on security estimates was unclear. We assess this impact thanks to extensive experiments with BKZ 2.0, the first state-of-the-art implementation of BKZ incorporating recent improvements, such as Gama-Nguyen-Regev pruning. We propose an efficient simulation algorithm to model the behaviour of BKZ in high dimension with high blocksize $geq 50$, which can predict approximately both the output quality and the running time, thereby revising lattice security estimates. For instance, our simulation suggests that the smallest NTRUSign parameter set, which was claimed to provide at least 93-bit security against key-recovery lattice attacks, actually offers at most 65-bit security.

References in zbMATH (referenced in 25 articles , 1 standard article )

Showing results 1 to 20 of 25.
Sorted by year (citations)

1 2 next

  1. Chung, Kyungmi; Lee, Hyang-Sook; Lim, Seongan: An efficient lattice reduction using reuse technique blockwisely on NTRU (2016)
  2. Doröz, Yarkın; Hu, Yin; Sunar, Berk: Homomorphic AES evaluation using the modified LTV scheme (2016)
  3. Albrecht, Martin R.; Cid, Carlos; Faugère, Jean-Charles; Fitzpatrick, Robert; Perret, Ludovic: On the complexity of the BKW algorithm on LWE (2015)
  4. Guo, Qian; Johansson, Thomas; Stankovski, Paul: Coded-BKW: solving LWE using lattice codes (2015)
  5. Jarvis, Katherine; Nevins, Monica: ETRU: NTRU over the Eisenstein integers (2015)
  6. Kirchner, Paul; Fouque, Pierre-Alain: An improved BKW algorithm for LWE with applications to cryptography and lattices (2015)
  7. Laarhoven, Thijs; Mosca, Michele; van de Pol, Joop: Finding shortest lattice vectors faster using quantum search (2015)
  8. Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei: LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi’s FHE scheme (2015)
  9. Bai, Shi; Galbraith, Steven D.: An improved compression technique for signatures based on learning with errors (2014)
  10. Fontein, Felix; Schneider, Michael; Wagner, Urs: PotLLL: a polynomial time version of LLL with deep insertions (2014)
  11. Lepoint, Tancrède; Naehrig, Michael: A comparison of the homomorphic encryption schemes FV and YASHE (2014)
  12. Yasuda, Masaya; Shimoyama, Takeshi; Kogure, Jun: Secret computation of purchase history data using somewhat homomorphic encryption (2014)
  13. Bay, Aslı; Boureanu, Ioana; Mitrokotsa, Aikaterini; Spulber, Iosif; Vaudenay, Serge: The Bussard-Bagga and other distance-bounding protocols under attacks (2013)
  14. Bos, Joppe W.; Lauter, Kristin; Loftus, Jake; Naehrig, Michael: Improved security for a ring-based fully homomorphic encryption scheme (2013)
  15. Laarhoven, Thijs; Mosca, Michele; van de Pol, Joop: Solving the shortest vector problem in lattices faster using quantum search (2013)
  16. Micciancio, Daniele; Peikert, Chris: Hardness of SIS and LWE with small parameters (2013)
  17. Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei: Lattice reduction for modular knapsack (2013)
  18. van de Pol, Joop; Smart, Nigel P.: Estimating key sizes for high dimensional lattice-based systems (2013)
  19. Yan, Jianhua; Wang, Licheng; Wang, Lihua; Yang, Yixian; Yao, Wenbin: Efficient lattice-based signcryption in standard model (2013)
  20. Chen, Yuanmi; Nguyen, Phong Q.: Faster algorithms for approximate common divisors: breaking fully-homomorphic-encryption challenges over the integers (2012)

1 2 next