Estimate All the {LWE, NTRU} Schemes
We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different...
Saved in:
Published in | Security and Cryptography for Networks Vol. 11035; pp. 351 - 367 |
---|---|
Main Authors | , , , , , , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2018
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Online Access | Get full text |
Cover
Loading…
Abstract | We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different estimates for the asymptotic runtime of (block-wise) lattice reduction have on the predicted security of these schemes. Relying on the “LWE estimator” of Albrecht et al., we estimate the cost of running primal and dual lattice attacks against every LWE-based scheme, using every cost model proposed as part of a submission. Furthermore, we estimate the security of the proposed NTRU-based schemes against the primal attack under all cost models for lattice reduction. |
---|---|
AbstractList | We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different estimates for the asymptotic runtime of (block-wise) lattice reduction have on the predicted security of these schemes. Relying on the “LWE estimator” of Albrecht et al., we estimate the cost of running primal and dual lattice attacks against every LWE-based scheme, using every cost model proposed as part of a submission. Furthermore, we estimate the security of the proposed NTRU-based schemes against the primal attack under all cost models for lattice reduction. |
Author | Davidson, Alex Wunderer, Thomas Deo, Amit Albrecht, Martin R. Virdia, Fernando Curtis, Benjamin R. Player, Rachel Postlethwaite, Eamonn W. |
Author_xml | – sequence: 1 givenname: Martin R. surname: Albrecht fullname: Albrecht, Martin R. – sequence: 2 givenname: Benjamin R. surname: Curtis fullname: Curtis, Benjamin R. email: benjamin.curtis.2015@rhul.ac.uk – sequence: 3 givenname: Amit surname: Deo fullname: Deo, Amit – sequence: 4 givenname: Alex surname: Davidson fullname: Davidson, Alex – sequence: 5 givenname: Rachel surname: Player fullname: Player, Rachel – sequence: 6 givenname: Eamonn W. surname: Postlethwaite fullname: Postlethwaite, Eamonn W. – sequence: 7 givenname: Fernando surname: Virdia fullname: Virdia, Fernando email: fernando.virdia.2016@rhul.ac.uk – sequence: 8 givenname: Thomas surname: Wunderer fullname: Wunderer, Thomas email: twunderer@cdc.informatik.tu-darmstadt.de |
BookMark | eNpVkE1PAjEQhquiEZB_4GEPHq22nW7bORKCHwnRRDEem27pCrrs4nY9Gf-7Bbx4mEzyTN5JnndAenVTB0LOObvijOlr1IYCBY4UDedAmeV4QEYJQ4I7xg5JnyvOKYDEo383AT3SZ8AERS3hhAw4yxmi1FqfklGM74wxwQwaMH1yMY3dau26kI2rKuuWIfuevU4vs4f508tP9uyXYR3iGTkuXRXD6G8PyfxmOp_c0dnj7f1kPKMbIaGjBSrPvZIlOljkQWkoA2LBjUPUXoIocaGcd0VZFgBOGadzVzrhRZ4LVsCQiP3buGlX9VtobdE0H9Hy5J9qscnRgk2WdleB3daSQnIf2rTN51eInQ3blA9117rKL92mC220SiRfZaxIA7mEX9FsYEg |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2018 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2018 |
DBID | FFUUA |
DEWEY | 005.82 |
DOI | 10.1007/978-3-319-98113-0_19 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783319981130 3319981137 |
EISSN | 1611-3349 |
Editor | Catalano, Dario De Prisco, Roberto |
Editor_xml | – sequence: 1 fullname: Catalano, Dario – sequence: 2 fullname: De Prisco, Roberto |
EndPage | 367 |
ExternalDocumentID | EBC6298368_268_354 |
GroupedDBID | 0D6 0DA 38. AABBV AEDXK AEJLV AEKFX AEZAY ALMA_UNASSIGNED_HOLDINGS ANXHU BBABE BICGV BJAWL BUBNW CVGDX CZZ EDOXC FFUUA FOYMO I4C IEZ NQNQZ OEBZI SBO TPJZQ TSXQS Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p243t-b96c1c64f9a3d5e673fe99b18a997c432f9d6acabffb33a68a75afa2c25520b3 |
ISBN | 9783319981123 3319981129 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:14:46 EDT 2025 Thu May 29 01:12:47 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | QA268 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p243t-b96c1c64f9a3d5e673fe99b18a997c432f9d6acabffb33a68a75afa2c25520b3 |
Notes | T. Wunderer—The research of Albrecht was supported by EPSRC grant “Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption” (EP/P009417/1) and by the European Union PROMETHEUS project (Horizon 2020 Research and Innovation Program, grant 780701). The research of Curtis, Deo and Davidson was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/K035584/1). The research of Player was partially supported by the French Programme d’Investissement d’Avenir under national project RISQ P141580. The research of Postlethwaite and Virdia was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/P009301/1). The research of Wunderer was supported by the DFG as part of project P1 within the CRC 1119 CROSSING. |
OCLC | 1050994777 |
PQID | EBC6298368_268_354 |
PageCount | 17 |
ParticipantIDs | springer_books_10_1007_978_3_319_98113_0_19 proquest_ebookcentralchapters_6298368_268_354 |
PublicationCentury | 2000 |
PublicationDate | 2018 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – year: 2018 text: 2018 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings |
PublicationTitle | Security and Cryptography for Networks |
PublicationYear | 2018 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
SSID | ssj0002089838 ssj0002792 |
Score | 2.2470222 |
Snippet | We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 351 |
Title | Estimate All the {LWE, NTRU} Schemes |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6298368&ppg=354 http://link.springer.com/10.1007/978-3-319-98113-0_19 |
Volume | 11035 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELagXFZ7APah5akcyon1KrHj1xFKd6uq9IDKLjfLdpxjQTR7WBD_nXES0zZwYQ-xosiJnPkcZ2Y83wxC_ZR5klOTYWoLjnOmGLapLTGoGtzlmXWirqJwOeWj63x8w26WdUJrdkllf7iHN3kl_4MqXANcA0v2Hci-PBQuwDngCy0gDG1H-V13szYcjrbyXO3-H9z_u6va7NN15OC0Ce9erE6JIXzOoKD601CwMyicJ-J88qcOh5zOrq5PxEVIyukjJ6T1BWSy4wuIvsCON3HFoXX2a81-pDRQ7EDlomsLYpY2KUReLa-rERWB_RTupRjMCLX8ncQtdNokh-5ksx6eDzhRknKpCRzQaRNtCsl6aOtsOJ78fvGPkVRCNxnoOHGQqkmYtBz0ChXyrTGtGQ2dfe5afZjtoI-BUpIErgeMchdt-PkntB0LaiTt-voZ9SNCCSCUAELJI-DzPQnoPCUtNl_Q7OdwNhjhtowFvoPPoMJWcZc5npfK0IJ5LmjplbKZNEoJl1NSqoIbZ2xZWkoNl0YwUxriwNojqaVfUW9-O_ffUFKQnDNimSKFz10mDNgcoGALJUVROEH3EI4vrOu99jbA1zWvt9Ad0e-h0ygVHbovdExiDeLUVIM4dS1OHcS5_86nH6APyzl6iHrV_V9_BBpcZY9bsJ8BDto9OQ |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.atitle=Estimate+All+the+%7BLWE%2C+NTRU%7D+Schemes&rft.date=2018-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319981123&rft.volume=11035&rft_id=info:doi/10.1007%2F978-3-319-98113-0_19&rft.externalDBID=354&rft.externalDocID=EBC6298368_268_354 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6298368-l.jpg |