log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Huijing Gong - UMD
Friday, September 21, 2018, 1:00-2:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

This talk presents a variant of the dual-lattice attack against LWE with an unusually short secret, as proposed in https://eprint.iacr.org/2017/047.pdf.  The [Albrecht'17] abstract follows:

We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE. Applying them to parameter sets suggested by the homomorphic encryption libraries HElib and SEAL v2.0 yields revised security estimates. Our techniques scale the exponent of the dual-lattice attack by a factor of (2L)/(2L+1) when log q = Θ(Llog n), when the secret has constant hamming weight h and where L is the maximum depth of supported circuits. They also allow to half the dimension of the lattice under consideration at a multiplicative cost of 2^h operations. Moreover, our techniques yield revised concrete security estimates. For example, both libraries promise 80 bits of security for LWE instances with n = 1024 and log2 q ≈ 47, while the techniques described in this work lead to estimated costs of 68 bits (SEAL v2.0) and 62 bits (HElib). 

 

This talk is organized by Huijing Gong