Our attack is based on the attack on Poly-LWE which was presented in [EHL]. We extend the EHL-attack to apply to a larger class of number fields, and show how it applies to attack Ring-LWE for a heuristically large class of fields. Certain Ring-LWE instances can be transformed into Poly-LWE instances without distorting the error too much, and thus provide the first weak instances of the Ring-LWE problem. We also provide additional examples of fields which are vulnerable to our attacks on Poly-LWE, including power-of-2 cyclotomic fields, presented using the minimal polynomial of $\zeta_{2^n} \pm 1$.
Category / Keywords: public-key cryptography / attack, ring-lwe, learning with errors, poly-lwe, lattice-based cryptography, number theory Original Publication (with minor differences): IACR-CRYPTO-2015 Date: received 12 Feb 2015, last revised 21 Sep 2015 Contact author: klauter at microsoft com Available format(s): PDF | BibTeX Citation Version: 20150922:012723 (All versions of this report) Short URL: ia.cr/2015/106 Discussion forum: Show discussion | Start new discussion