[DDRG20] LWE with Side Information: Attacks and Concrete Security Estimation

Authors: Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi | Venue: CRYPTO 2020 | Source

Abstract

We propose a framework for cryptanalysis of LWE-based schemes when the attacker has access to side information — beyond the public data — that may arise from decryption failures, side channels, or implementation leakage. The side information is modeled as “hints”: noisy inner products for known vectors , which the attacker can progressively incorporate before running lattice reduction. Our toolkit includes operations for sparsifying the lattice, projecting onto hint-defined hyperplanes, and intersecting with them. We apply the framework to provide concrete security estimates for LAC, Round5, and NTRU under realistic leakage scenarios, and release the leaky-LWE-Estimator for the community.

BibTeX

@Inproceedings{C:DDGR20,
  author = {Dana {Dachman-Soled} and L{\'e}o Ducas and Huijing Gong and M{\'e}lissa Rossi},
  title = {{LWE} with Side Information: Attacks and Concrete Security Estimation},
  pages = {329--358},
  editor = {Daniele Micciancio and Thomas Ristenpart},
  booktitle = {Advances in Cryptology -- {CRYPTO}~2020, Part~II},
  volume = {12171},
  series = {Lecture Notes in Computer Science},
  address = {Santa Barbara, CA, USA},
  month = {aug~17--21},
  publisher = {Springer, Cham, Switzerland},
  year = {2020},
  doi = {10.1007/978-3-030-56880-1_12},
}