dc.contributor.author | Budroni, Alessandro | |
dc.contributor.author | Guo, Qian | |
dc.contributor.author | Johansson, Thomas | |
dc.contributor.author | Mårtensson, Erik | |
dc.contributor.author | Wagner, Paul Stankovski | |
dc.date.accessioned | 2022-02-02T13:56:28Z | |
dc.date.available | 2022-02-02T13:56:28Z | |
dc.date.created | 2021-11-18T12:28:50Z | |
dc.date.issued | 2021 | |
dc.identifier.issn | 2410-387X | |
dc.identifier.uri | https://hdl.handle.net/11250/2976696 | |
dc.description.abstract | The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of BKW-style algorithms for solving LWE instances. We target minimum concrete complexity, and we introduce a new reduction step where we partially reduce the last position in an iteration and finish the reduction in the next iteration, allowing non-integer step sizes. We also introduce a new procedure in the secret recovery by mapping the problem to binary problems and applying the fast Walsh Hadamard transform. The complexity of the resulting algorithm compares favorably with all other previous approaches, including lattice sieving. We additionally show the steps of implementing the approach for large LWE problem instances. We provide two implementations of the algorithm, one RAM-based approach that is optimized for speed, and one file-based approach which overcomes RAM limitations by using file-based storage. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | MDPI | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | Improvements on making BKW practical for solving LWE | en_US |
dc.type | Journal article | en_US |
dc.type | Peer reviewed | en_US |
dc.description.version | publishedVersion | en_US |
dc.rights.holder | Copyright 2021 by the authors | en_US |
dc.source.articlenumber | 31 | en_US |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |
dc.identifier.doi | 10.3390/cryptography5040031 | |
dc.identifier.cristin | 1955925 | |
dc.source.journal | Cryptography | en_US |
dc.identifier.citation | Cryptography. 2021, 5 (4), 31. | en_US |
dc.source.volume | 5 | en_US |
dc.source.issue | 4 | en_US |