Paper 2016/127

A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes

Martin Albrecht, Shi Bai, and Léo Ducas

Abstract

The subfield attack exploits the presence of a subfield to solve overstretched versions of the NTRU assumption: norming the public key $h$ down to a subfield may lead to an easier lattice problem and any sufficiently good solution may be lifted to a short vector in the full NTRU-lattice. This approach was originally sketched in a paper of Gentry and Szydlo at Eurocrypt'02 and there also attributed to Jonsson, Nguyen and Stern. However, because it does not apply for small moduli and hence NTRUEncrypt, it seems to have been forgotten. In this work, we resurrect this approach, fill some gaps, analyze and generalize it to any subfields and apply it to more recent schemes. We show that for significantly larger moduli ---a case we call overstretched--- the subfield attack is applicable and asymptotically outperforms other known attacks. This directly affects the asymptotic security of the bootstrappable homomorphic encryption schemes LTV and YASHE which rely on a mildly overstretched NTRU assumption: the subfield lattice attack runs in sub-exponential time $2^{O(\lambda/\log^{1/3}\lambda)}$ invalidating the security claim of $2^{\Theta(\lambda)}$. The effect is more dramatic on GGH-like Multilinear Maps: this attack can run in polynomial time without *encodings of zero* nor the *zero-testing parameter*, yet requiring an additional quantum step to recover the secret parameters exactly. We also report on practical experiments. Running LLL in dimension $512$ we obtain vectors that would have otherwise required running BKZ with block-size $130$ in dimension $8192$. Finally, we discuss concrete aspects of this attack, the condition on the modulus $q$ to guarantee full immunity, discuss countermeasures and propose open questions.

Metadata
Available format(s)
PDF
Publication info
A minor revision of an IACR publication in CRYPTO 2016
Keywords
Subfield lattice attackoverstretched NTRUFHEGraded Encoding Schemes.
Contact author(s)
ducas @ cwi nl
shih bai @ gmail com
martinralbrecht @ googlemail com
History
2016-07-04: last of 4 revisions
2016-02-14: received
See all versions
Short URL
https://ia.cr/2016/127
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/127,
      author = {Martin Albrecht and Shi Bai and Léo Ducas},
      title = {A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2016/127},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/127}},
      url = {https://eprint.iacr.org/2016/127}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.