Provably weak instances of Ring-LWE revisited Wouter Castryck 1 , 2 - - PowerPoint PPT Presentation

provably weak instances of ring lwe revisited
SMART_READER_LITE
LIVE PREVIEW

Provably weak instances of Ring-LWE revisited Wouter Castryck 1 , 2 - - PowerPoint PPT Presentation

Provably weak instances of Ring-LWE revisited Wouter Castryck 1 , 2 , Ilia Iliashenko 1 , Frederik Vercauteren 1 , 3 1 COSIC, KU Leuven 2 Ghent University 3 Open Security Research EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE


slide-1
SLIDE 1

Provably weak instances

  • f Ring-LWE revisited

Wouter Castryck1,2, Ilia Iliashenko1, Frederik Vercauteren1,3

1 COSIC, KU Leuven 2 Ghent University 3 Open Security Research EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 1/15

slide-2
SLIDE 2

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE,

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-3
SLIDE 3

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-4
SLIDE 4

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances. ◮ Vulnerable meaning: leak partial information about the

secret with non-negligible probability.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-5
SLIDE 5

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances. ◮ Vulnerable meaning: leak partial information about the

secret with non-negligible probability. However,

◮ they did not set up Ring-LWE as described in [LPR].

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-6
SLIDE 6

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances. ◮ Vulnerable meaning: leak partial information about the

secret with non-negligible probability. However,

◮ they did not set up Ring-LWE as described in [LPR]. ◮ Their instantiation generates many noise-free equations

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-7
SLIDE 7

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances. ◮ Vulnerable meaning: leak partial information about the

secret with non-negligible probability. However,

◮ they did not set up Ring-LWE as described in [LPR]. ◮ Their instantiation generates many noise-free equations ◮ allowing to recover the entire secret with near certainty.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-8
SLIDE 8

Abstract

We revisit the paper Provably weak instances of Ring-LWE

by Y. Elias, K. Lauter, E. Ozman, K. Stange, CRYPTO 2015

in which the authors

◮ investigate if evaluation-at-1-attacks apply to Ring-LWE, ◮ claim to have indeed found vulnerable instances. ◮ Vulnerable meaning: leak partial information about the

secret with non-negligible probability. However,

◮ they did not set up Ring-LWE as described in [LPR]. ◮ Their instantiation generates many noise-free equations ◮ allowing to recover the entire secret with near certainty.

Currently no threat to Ring-LWE.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 2/15

slide-9
SLIDE 9
  • 1. Learning With Errors (LWE)

The LWE problem (O. Regev, ‘05): solve a linear system      b0 b1 . . . bn−1      ≈      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1     

  • ver a finite field Fp for a secret (s0, s1, . . . , sn−1) ∈ Fn

p where

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 3/15

slide-10
SLIDE 10
  • 1. Learning With Errors (LWE)

The LWE problem (O. Regev, ‘05): solve a linear system      b0 b1 . . . bn−1      ≈      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1     

  • ver a finite field Fp for a secret (s0, s1, . . . , sn−1) ∈ Fn

p where ◮ each equation is perturbed by a “small” error, i.e.

bi = ai0s0 + ai1s1 + · · · + ai,n−1sn−1 + ei,

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 3/15

slide-11
SLIDE 11
  • 1. Learning With Errors (LWE)

The LWE problem (O. Regev, ‘05): solve a linear system      b0 b1 . . . bn−1      ≈      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1     

  • ver a finite field Fp for a secret (s0, s1, . . . , sn−1) ∈ Fn

p where ◮ each equation is perturbed by a “small” error, i.e.

bi = ai0s0 + ai1s1 + · · · + ai,n−1sn−1 + ei,

◮ the aij ∈ Fp are chosen uniformly randomly,

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 3/15

slide-12
SLIDE 12
  • 1. Learning With Errors (LWE)

The LWE problem (O. Regev, ‘05): solve a linear system      b0 b1 . . . bn−1      ≈      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1     

  • ver a finite field Fp for a secret (s0, s1, . . . , sn−1) ∈ Fn

p where ◮ each equation is perturbed by a “small” error, i.e.

bi = ai0s0 + ai1s1 + · · · + ai,n−1sn−1 + ei,

◮ the aij ∈ Fp are chosen uniformly randomly, ◮ an adversary can ask for new equations (m > n).

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 3/15

slide-13
SLIDE 13
  • 1. Learning With Errors (LWE)

The LWE problem (O. Regev, ‘05): solve a linear system      b0 b1 . . . bn−1      =      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1      +      e0 e1 . . . en−1     

  • ver a finite field Fp for a secret (s0, s1, . . . , sn−1) ∈ Fn

p where ◮ each equation is perturbed by a “small” error, i.e.

bi = ai0s0 + ai1s1 + · · · + ai,n−1sn−1 + ei,

◮ the aij ∈ Fp are chosen uniformly randomly, ◮ an adversary can ask for new equations (m > n).

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 3/15

slide-14
SLIDE 14
  • 1. Learning With Errors (LWE)

Features:

◮ hardness reduction from classical lattice problems, ◮ versatile building block for cryptography, enabling exciting

applications (FHE, PQ crypto, . . . )

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 4/15

slide-15
SLIDE 15
  • 1. Learning With Errors (LWE)

Features:

◮ hardness reduction from classical lattice problems, ◮ versatile building block for cryptography, enabling exciting

applications (FHE, PQ crypto, . . . ) Drawback: key size.

◮ To hide the secret one needs an entire linear system:

     b0 b1 . . . bn−1      ≈      a10 a11 . . . a1,n−1 a20 a21 . . . a2,n−1 . . . . . . ... . . . am0 am1 . . . am,n−1      ·      s0 s1 . . . sn−1     . ↑ ↑ ↑ n log p mn log p n log p

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 4/15

slide-16
SLIDE 16
  • 2. Ring-based LWE

Solution:

◮ Identify key space

Fn

p

with Z[x] (p, f(x)) for some monic deg n polynomial f(x) ∈ Z[x], by viewing (s0, s1, . . . , sn−1) as s0 + s1x + s2x2 + · · · + sn−1xn−1.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 5/15

slide-17
SLIDE 17
  • 2. Ring-based LWE

Solution:

◮ Identify key space

Fn

p

with Z[x] (p, f(x)) for some monic deg n polynomial f(x) ∈ Z[x], by viewing (s0, s1, . . . , sn−1) as s0 + s1x + s2x2 + · · · + sn−1xn−1.

◮ Use samples of the form

     b0 b1 . . . bn−1      ≈ Aa·      s0 s1 . . . sn−1      with Aa the matrix of multiplication by some random a(x) = a0 + a1x + · · · + an−1xn−1.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 5/15

slide-18
SLIDE 18
  • 2. Ring-based LWE

Solution:

◮ Identify key space

Fn

p

with Z[x] (p, f(x)) for some monic deg n polynomial f(x) ∈ Z[x], by viewing (s0, s1, . . . , sn−1) as s0 + s1x + s2x2 + · · · + sn−1xn−1.

◮ Use samples of the form

     b0 b1 . . . bn−1      ≈ Aa·      s0 s1 . . . sn−1      with Aa the matrix of multiplication by some random a(x) = a0 + a1x + · · · + an−1xn−1.

◮ Store a(x) rather than Aa: saves factor n.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 5/15

slide-19
SLIDE 19
  • 2. Ring-based LWE

Example:

◮ if f(x) = xn − 1, then Aa is the circulant matrix

       a0 an−1 . . . a2 a1 a1 a0 . . . a3 a2 a2 a1 . . . a4 a3 . . . . . . ... . . . . . . an−1 an−2 . . . a1 a0       

  • f which it suffices to store the first column.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 6/15

slide-20
SLIDE 20
  • 2. Ring-based LWE

Example:

◮ if f(x) = xn − 1, then Aa is the circulant matrix

       a0 an−1 . . . a2 a1 a1 a0 . . . a3 a2 a2 a1 . . . a4 a3 . . . . . . ... . . . . . . an−1 an−2 . . . a1 a0       

  • f which it suffices to store the first column.

◮ Bad example, because of . . .

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 6/15

slide-21
SLIDE 21
  • 3. Evaluation-at-1 attack

Potential threat:

◮ Suppose f(1) ≡ 0 mod p, then

Z[x] (p, f(x)) → Fp : r(x) → r(1) = r0 + r1 + · · · + rn−1, is a well-defined ring homomorphism.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 7/15

slide-22
SLIDE 22
  • 3. Evaluation-at-1 attack

Potential threat:

◮ Suppose f(1) ≡ 0 mod p, then

Z[x] (p, f(x)) → Fp : r(x) → r(1) = r0 + r1 + · · · + rn−1, is a well-defined ring homomorphism.

◮ Our ring-based LWE samples

b(x) = a(x) · s(x) + e(x) evaluate to b(1) = a(1) · s(1) + e(1).

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 7/15

slide-23
SLIDE 23
  • 3. Evaluation-at-1 attack

Potential threat:

◮ Suppose f(1) ≡ 0 mod p, then

Z[x] (p, f(x)) → Fp : r(x) → r(1) = r0 + r1 + · · · + rn−1, is a well-defined ring homomorphism.

◮ Our ring-based LWE samples

b(x) = a(x) · s(x) + e(x) evaluate to b(1) = a(1) · s(1) + e(1).

◮ For each guess for s(1) ∈ Fp, analyze distribution of e(1).

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 7/15

slide-24
SLIDE 24
  • 3. Evaluation-at-1 attack

Potential threat:

◮ Suppose f(1) ≡ 0 mod p, then

Z[x] (p, f(x)) → Fp : r(x) → r(1) = r0 + r1 + · · · + rn−1, is a well-defined ring homomorphism.

◮ Our ring-based LWE samples

b(x) = a(x) · s(x) + e(x) evaluate to b(1) = a(1) · s(1) + e(1).

◮ For each guess for s(1) ∈ Fp, analyze distribution of e(1). ◮ Non-uniformity might reveal s(1), and maybe more . . .

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 7/15

slide-25
SLIDE 25
  • 3. Evaluation-at-1 attack

Potential threat:

◮ Suppose f(1) ≡ 0 mod p, then

Z[x] (p, f(x)) → Fp : r(x) → r(1) = r0 + r1 + · · · + rn−1, is a well-defined ring homomorphism.

◮ Our ring-based LWE samples

b(x) = a(x) · s(x) + e(x) evaluate to b(1) = a(1) · s(1) + e(1).

◮ For each guess for s(1) ∈ Fp, analyze distribution of e(1). ◮ Non-uniformity might reveal s(1), and maybe more . . .

Safety measure: restrict to irreducible f(x) ∈ Z[x].

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 7/15

slide-26
SLIDE 26
  • 4. Ring-LWE

Direct ring-based analogue of LWE-sample would read      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1·      e0 e1 . . . en−1      with the ei sampled independently from N(0, σ) for some fixed small σ = σ(n).

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 8/15

slide-27
SLIDE 27
  • 4. Ring-LWE

Direct ring-based analogue of LWE-sample would read      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1·      e0 e1 . . . en−1      with the ei sampled independently from N(0, σ) for some fixed small σ = σ(n). This is not Ring-LWE!

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 8/15

slide-28
SLIDE 28
  • 4. Ring-LWE

Direct ring-based analogue of LWE-sample would read      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1·      e0 e1 . . . en−1      with the ei sampled independently from N(0, σ) for some fixed small σ = σ(n). This is not Ring-LWE!

◮ Not backed up by hardness statement.

◮ Evaluation-at-1 known to work in special cases [ELS]. EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 8/15

slide-29
SLIDE 29
  • 4. Ring-LWE

Direct ring-based analogue of LWE-sample would read      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1·      e0 e1 . . . en−1      with the ei sampled independently from N(0, σ) for some fixed small σ = σ(n). This is not Ring-LWE!

◮ Not backed up by hardness statement.

◮ Evaluation-at-1 known to work in special cases [ELS].

◮ Sometimes called Poly-LWE.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 8/15

slide-30
SLIDE 30
  • 4. Ring-LWE

So what is Ring-LWE according to [LPR]? Samples look like      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1·      e0 e1 . . . en−1     

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 9/15

slide-31
SLIDE 31
  • 4. Ring-LWE

So what is Ring-LWE according to [LPR]? Samples look like      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      where

◮ B is the canonical embedding matrix, ◮ Af ′(x) compensates for the fact that one

actually picks secrets from the dual.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 9/15

slide-32
SLIDE 32
  • 4. Ring-LWE

So what is Ring-LWE according to [LPR]? Samples look like      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      where

◮ B is the canonical embedding matrix, ◮ Af ′(x) compensates for the fact that one

actually picks secrets from the dual. Hardness reduction from ideal lattice problems.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 9/15

slide-33
SLIDE 33
  • 4. Ring-LWE

So what is Ring-LWE according to [LPR]? Samples look like      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      where

◮ B is the canonical embedding matrix, ◮ Af ′(x) compensates for the fact that one

actually picks secrets from the dual. Hardness reduction from ideal lattice problems. Note:

◮ factor Af ′(x) · B−1 might skew the error distribution,

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 9/15

slide-34
SLIDE 34
  • 4. Ring-LWE

So what is Ring-LWE according to [LPR]? Samples look like      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      where

◮ B is the canonical embedding matrix, ◮ Af ′(x) compensates for the fact that one

actually picks secrets from the dual. Hardness reduction from ideal lattice problems. Note:

◮ factor Af ′(x) · B−1 might skew the error distribution, ◮ but also scales it!

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 9/15

slide-35
SLIDE 35
  • 4. Ring-LWE

. . . but also scales it!      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      Indeed, one has

◮ det Af ′(x) = ∆ with

∆ = |disc f(x)| , ← could be huge

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 10/15

slide-36
SLIDE 36
  • 4. Ring-LWE

. . . but also scales it!      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      Indeed, one has

◮ det Af ′(x) = ∆ with

∆ = |disc f(x)| , ← could be huge

◮ det B−1 = 1/

√ ∆.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 10/15

slide-37
SLIDE 37
  • 4. Ring-LWE

. . . but also scales it!      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x) · B−1 ·      e0 e1 . . . en−1      Indeed, one has

◮ det Af ′(x) = ∆ with

∆ = |disc f(x)| , ← could be huge

◮ det B−1 = 1/

√ ∆. So “on average”, each ei is scaled up by √ ∆

1/n . . . ◮ . . . but remember: skewness.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 10/15

slide-38
SLIDE 38
  • 5. Provably weak instances of Ring-LWE revisited

[ELOS] constructed families of polynomials f(x) that are vulnerable to an evaluation-at-1 attack. For convenience they picked non-dual secrets:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x)· B−1 ·      e0 e1 . . . en−1      .

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 11/15

slide-39
SLIDE 39
  • 5. Provably weak instances of Ring-LWE revisited

[ELOS] constructed families of polynomials f(x) that are vulnerable to an evaluation-at-1 attack. For convenience they picked non-dual secrets:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x)· B−1 ·      e0 e1 . . . en−1      . Recall:

◮ det B−1 = 1/

√ ∆, so the errors get squeezed.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 11/15

slide-40
SLIDE 40
  • 5. Provably weak instances of Ring-LWE revisited

[ELOS] constructed families of polynomials f(x) that are vulnerable to an evaluation-at-1 attack. For convenience they picked non-dual secrets:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + Af ′(x)· B−1 ·      e0 e1 . . . en−1      . Recall:

◮ det B−1 = 1/

√ ∆, so the errors get squeezed.

◮ To compensate, they scale up the errors by a factor

√ ∆

1/n.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 11/15

slide-41
SLIDE 41
  • 5. Provably weak instances of Ring-LWE revisited

[ELOS] constructed families of polynomials f(x) that are vulnerable to an evaluation-at-1 attack. For convenience they picked non-dual secrets:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + √ ∆

1/nB−1 ·

     e0 e1 . . . en−1      . Recall:

◮ det B−1 = 1/

√ ∆, so the errors get squeezed.

◮ To compensate, they scale up the errors by a factor

√ ∆

1/n.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 11/15

slide-42
SLIDE 42
  • 5. Provably weak instances of Ring-LWE revisited

Issue:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + √ ∆

1/nB−1 ·

     e0 e1 . . . en−1      .

◮ The factor

√ ∆

1/n compensates for B−1 only “on average”.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 12/15

slide-43
SLIDE 43
  • 5. Provably weak instances of Ring-LWE revisited

Issue:      b0 b1 . . . bn−1      = Aa ·      s0 s1 . . . sn−1      + √ ∆

1/nB−1 ·

     e0 e1 . . . en−1      .

◮ The factor

√ ∆

1/n compensates for B−1 only “on average”. ◮ In some coordinates B−1 could scale down much more.

Compensation factor is insufficient merely rounding yields exact equations in the secret!

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 12/15

slide-44
SLIDE 44
  • 5. Provably weak instances of Ring-LWE revisited

All instances from [ELOS] suffer from this skewness.

◮ Example: f(x) = x256 + 8190, p = 8191. ← note: f(1) ≡ 0 mod p ◮ Standard deviations even form a geometric series!

Error distribution in each coordinate (experimental):

3σ σ µ

20 40 60 80 100 120 140 160 180 200 220 240 200 400 600 800 1,000 1,200

coordinate index

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 13/15

slide-45
SLIDE 45
  • 5. Provably weak instances of Ring-LWE revisited

All instances from [ELOS] suffer from this skewness.

◮ Example: f(x) = x256 + 8190, p = 8191. ← note: f(1) ≡ 0 mod p ◮ Standard deviations even form a geometric series!

Error distribution in each coordinate (experimental):

3σ σ

1 2 −

→ µ

150 160 170 180 190 200 210 220 230 240 250 2 4 6

coordinate index

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 13/15

slide-46
SLIDE 46
  • 5. Provably weak instances of Ring-LWE revisited

Evaluation-at-1 allowed [ELOS] to recover s(1),

◮ using about 20 samples with a success rate of 20%.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 14/15

slide-47
SLIDE 47
  • 5. Provably weak instances of Ring-LWE revisited

Evaluation-at-1 allowed [ELOS] to recover s(1),

◮ using about 20 samples with a success rate of 20%.

But after rounding, the last ≈ n/7 equations become exact,

◮ so 7 or 8 samples suffice to recover s(x) exactly.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 14/15

slide-48
SLIDE 48
  • 5. Provably weak instances of Ring-LWE revisited

Evaluation-at-1 allowed [ELOS] to recover s(1),

◮ using about 20 samples with a success rate of 20%.

But after rounding, the last ≈ n/7 equations become exact,

◮ so 7 or 8 samples suffice to recover s(x) exactly.

Similar remarks apply to the other instances from [ELOS].

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 14/15

slide-49
SLIDE 49
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15

slide-50
SLIDE 50
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

◮ Currently, evaluation-at-1 is not a threat to Ring-LWE.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15

slide-51
SLIDE 51
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

◮ Currently, evaluation-at-1 is not a threat to Ring-LWE. ◮ Both B−1 and Af ′(x) · B−1 can be very skew, so mostly a

matter of insufficient scaling, rather than dual vs. non-dual.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15

slide-52
SLIDE 52
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

◮ Currently, evaluation-at-1 is not a threat to Ring-LWE. ◮ Both B−1 and Af ′(x) · B−1 can be very skew, so mostly a

matter of insufficient scaling, rather than dual vs. non-dual.

◮ To compensate for Af ′(x) a factor ∆1/n makes more sense.

Does scaling this way lead to a provably hard problem?

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15

slide-53
SLIDE 53
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

◮ Currently, evaluation-at-1 is not a threat to Ring-LWE. ◮ Both B−1 and Af ′(x) · B−1 can be very skew, so mostly a

matter of insufficient scaling, rather than dual vs. non-dual.

◮ To compensate for Af ′(x) a factor ∆1/n makes more sense.

Does scaling this way lead to a provably hard problem?

◮ If one does scale the [ELOS] examples sufficiently, then

the error coordinates of low index become uniform.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15

slide-54
SLIDE 54
  • 5. Provably weak instances of Ring-LWE revisited

Concluding thoughts/remarks:

◮ Currently, evaluation-at-1 is not a threat to Ring-LWE. ◮ Both B−1 and Af ′(x) · B−1 can be very skew, so mostly a

matter of insufficient scaling, rather than dual vs. non-dual.

◮ To compensate for Af ′(x) a factor ∆1/n makes more sense.

Does scaling this way lead to a provably hard problem?

◮ If one does scale the [ELOS] examples sufficiently, then

the error coordinates of low index become uniform.

◮ The cyclotomic case seems naturally protected against

geometric growth.

EUROCRYPT, May 9, 2016 Provably weak instances of Ring-LWE revisited 15/15