Paper 2015/106

Provably weak instances of Ring-LWE

Yara Elias, Kristin E. Lauter, Ekin Ozman, and Katherine E. Stange

Abstract

The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate the attack in both theory and practice, providing code and running times for the attack. The attack runs in time linear in q, where q is the modulus. Our attack is based on the attack on Poly-LWE which was presented in [EHL]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-2 cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in CRYPTO 2015
Keywords
attackring-lwelearning with errorspoly-lwelattice-based cryptographynumber theory
Contact author(s)
klauter @ microsoft com
History
2015-09-22: revised
2015-02-24: received
See all versions
Short URL
https://ia.cr/2015/106
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/106,
      author = {Yara Elias and Kristin E.  Lauter and Ekin Ozman and Katherine E.  Stange},
      title = {Provably weak instances of Ring-LWE},
      howpublished = {Cryptology ePrint Archive, Paper 2015/106},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/106}},
      url = {https://eprint.iacr.org/2015/106}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.