Estimate All the {LWE, NTRU} Schemes

We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different...

Full description

Saved in:
Bibliographic Details
Published inSecurity and Cryptography for Networks Vol. 11035; pp. 351 - 367
Main Authors Albrecht, Martin R., Curtis, Benjamin R., Deo, Amit, Davidson, Alex, Player, Rachel, Postlethwaite, Eamonn W., Virdia, Fernando, Wunderer, Thomas
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2018
Springer International Publishing
SeriesLecture Notes in Computer Science
Online AccessGet full text

Cover

Loading…
Abstract We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different estimates for the asymptotic runtime of (block-wise) lattice reduction have on the predicted security of these schemes. Relying on the “LWE estimator” of Albrecht et al., we estimate the cost of running primal and dual lattice attacks against every LWE-based scheme, using every cost model proposed as part of a submission. Furthermore, we estimate the security of the proposed NTRU-based schemes against the primal attack under all cost models for lattice reduction.
AbstractList We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different estimates for the asymptotic runtime of (block-wise) lattice reduction have on the predicted security of these schemes. Relying on the “LWE estimator” of Albrecht et al., we estimate the cost of running primal and dual lattice attacks against every LWE-based scheme, using every cost model proposed as part of a submission. Furthermore, we estimate the security of the proposed NTRU-based schemes against the primal attack under all cost models for lattice reduction.
Author Davidson, Alex
Wunderer, Thomas
Deo, Amit
Albrecht, Martin R.
Virdia, Fernando
Curtis, Benjamin R.
Player, Rachel
Postlethwaite, Eamonn W.
Author_xml – sequence: 1
  givenname: Martin R.
  surname: Albrecht
  fullname: Albrecht, Martin R.
– sequence: 2
  givenname: Benjamin R.
  surname: Curtis
  fullname: Curtis, Benjamin R.
  email: benjamin.curtis.2015@rhul.ac.uk
– sequence: 3
  givenname: Amit
  surname: Deo
  fullname: Deo, Amit
– sequence: 4
  givenname: Alex
  surname: Davidson
  fullname: Davidson, Alex
– sequence: 5
  givenname: Rachel
  surname: Player
  fullname: Player, Rachel
– sequence: 6
  givenname: Eamonn W.
  surname: Postlethwaite
  fullname: Postlethwaite, Eamonn W.
– sequence: 7
  givenname: Fernando
  surname: Virdia
  fullname: Virdia, Fernando
  email: fernando.virdia.2016@rhul.ac.uk
– sequence: 8
  givenname: Thomas
  surname: Wunderer
  fullname: Wunderer, Thomas
  email: twunderer@cdc.informatik.tu-darmstadt.de
BookMark eNpVkE1PAjEQhquiEZB_4GEPHq22nW7bORKCHwnRRDEem27pCrrs4nY9Gf-7Bbx4mEzyTN5JnndAenVTB0LOObvijOlr1IYCBY4UDedAmeV4QEYJQ4I7xg5JnyvOKYDEo383AT3SZ8AERS3hhAw4yxmi1FqfklGM74wxwQwaMH1yMY3dau26kI2rKuuWIfuevU4vs4f508tP9uyXYR3iGTkuXRXD6G8PyfxmOp_c0dnj7f1kPKMbIaGjBSrPvZIlOljkQWkoA2LBjUPUXoIocaGcd0VZFgBOGadzVzrhRZ4LVsCQiP3buGlX9VtobdE0H9Hy5J9qscnRgk2WdleB3daSQnIf2rTN51eInQ3blA9117rKL92mC220SiRfZaxIA7mEX9FsYEg
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2018
Copyright_xml – notice: Springer Nature Switzerland AG 2018
DBID FFUUA
DEWEY 005.82
DOI 10.1007/978-3-319-98113-0_19
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783319981130
3319981137
EISSN 1611-3349
Editor Catalano, Dario
De Prisco, Roberto
Editor_xml – sequence: 1
  fullname: Catalano, Dario
– sequence: 2
  fullname: De Prisco, Roberto
EndPage 367
ExternalDocumentID EBC6298368_268_354
GroupedDBID 0D6
0DA
38.
AABBV
AEDXK
AEJLV
AEKFX
AEZAY
ALMA_UNASSIGNED_HOLDINGS
ANXHU
BBABE
BICGV
BJAWL
BUBNW
CVGDX
CZZ
EDOXC
FFUUA
FOYMO
I4C
IEZ
NQNQZ
OEBZI
SBO
TPJZQ
TSXQS
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p243t-b96c1c64f9a3d5e673fe99b18a997c432f9d6acabffb33a68a75afa2c25520b3
ISBN 9783319981123
3319981129
ISSN 0302-9743
IngestDate Tue Jul 29 20:14:46 EDT 2025
Thu May 29 01:12:47 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum QA268
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p243t-b96c1c64f9a3d5e673fe99b18a997c432f9d6acabffb33a68a75afa2c25520b3
Notes T. Wunderer—The research of Albrecht was supported by EPSRC grant “Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption” (EP/P009417/1) and by the European Union PROMETHEUS project (Horizon 2020 Research and Innovation Program, grant 780701). The research of Curtis, Deo and Davidson was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/K035584/1). The research of Player was partially supported by the French Programme d’Investissement d’Avenir under national project RISQ P141580. The research of Postlethwaite and Virdia was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/P009301/1). The research of Wunderer was supported by the DFG as part of project P1 within the CRC 1119 CROSSING.
OCLC 1050994777
PQID EBC6298368_268_354
PageCount 17
ParticipantIDs springer_books_10_1007_978_3_319_98113_0_19
proquest_ebookcentralchapters_6298368_268_354
PublicationCentury 2000
PublicationDate 2018
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – year: 2018
  text: 2018
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings
PublicationTitle Security and Cryptography for Networks
PublicationYear 2018
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0002089838
ssj0002792
Score 2.2470222
Snippet We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum...
SourceID springer
proquest
SourceType Publisher
StartPage 351
Title Estimate All the {LWE, NTRU} Schemes
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6298368&ppg=354
http://link.springer.com/10.1007/978-3-319-98113-0_19
Volume 11035
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELagXFZ7APah5akcyon1KrHj1xFKd6uq9IDKLjfLdpxjQTR7WBD_nXES0zZwYQ-xosiJnPkcZ2Y83wxC_ZR5klOTYWoLjnOmGLapLTGoGtzlmXWirqJwOeWj63x8w26WdUJrdkllf7iHN3kl_4MqXANcA0v2Hci-PBQuwDngCy0gDG1H-V13szYcjrbyXO3-H9z_u6va7NN15OC0Ce9erE6JIXzOoKD601CwMyicJ-J88qcOh5zOrq5PxEVIyukjJ6T1BWSy4wuIvsCON3HFoXX2a81-pDRQ7EDlomsLYpY2KUReLa-rERWB_RTupRjMCLX8ncQtdNokh-5ksx6eDzhRknKpCRzQaRNtCsl6aOtsOJ78fvGPkVRCNxnoOHGQqkmYtBz0ChXyrTGtGQ2dfe5afZjtoI-BUpIErgeMchdt-PkntB0LaiTt-voZ9SNCCSCUAELJI-DzPQnoPCUtNl_Q7OdwNhjhtowFvoPPoMJWcZc5npfK0IJ5LmjplbKZNEoJl1NSqoIbZ2xZWkoNl0YwUxriwNojqaVfUW9-O_ffUFKQnDNimSKFz10mDNgcoGALJUVROEH3EI4vrOu99jbA1zWvt9Ad0e-h0ygVHbovdExiDeLUVIM4dS1OHcS5_86nH6APyzl6iHrV_V9_BBpcZY9bsJ8BDto9OQ
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.atitle=Estimate+All+the+%7BLWE%2C+NTRU%7D+Schemes&rft.date=2018-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319981123&rft.volume=11035&rft_id=info:doi/10.1007%2F978-3-319-98113-0_19&rft.externalDBID=354&rft.externalDocID=EBC6298368_268_354
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6298368-l.jpg