**A refined analysis of the cost for solving LWE via uSVP **

*Shi Bai and Shaun Miller and Weiqiang Wen*

**Abstract: **The learning with errors (LWE) problem (STOC'05) introduced by Regev is one of the fundamental problems in lattice-based cryptography. One standard strategy to solve the LWE problem is to reduce it to a unique SVP (uSVP) problem via Kannan's embedding and then apply a lattice reduction to solve the uSVP problem. There are two methods for estimating the cost for solving LWE via this strategy: the first method considers the largeness of the gap in the uSVP problem (Gama-Nguyen, Eurocrypt'08) and the second method (Alkim et al., USENIX'16) considers the shortness of the projection of the shortest vector to the Gram-Schmidt vectors. These two estimates have been investigated by Albrecht et al. (Asiacrypt'16) who present a sound analysis and show that the lattice reduction experiments fit more consistently with the second estimate. They also observe that in some cases the lattice reduction even behaves better than the second estimate perhaps due to the second intersection of the projected vector with the Gram-Schmidt vectors. In this work, we revisit the work of Alkim et al. and Albrecht et al. We first report further experiments providing more comparisons and suggest that
the second estimate leads to a more accurate prediction in practice. We also present empirical evidence confirming the assumptions used in the second estimate. Furthermore, we examine the gaps in uSVP derived from the embedded lattice and explain why it is preferable to use embedding height equal to 1 for the embedded lattice. This shows there is a coherent relation between the second estimate and the gaps in uSVP. Finally, it has been conjectured by Albrecht et al. that the second intersection will not happen for large parameters. We will show that this is indeed the case: there is no second intersection as the block size goes to infinity.

**Category / Keywords: **public-key cryptography / learning with errors, LWE, lattice reduction, Kannan's embedding, cryptanalysis

**Original Publication**** (with minor differences): **Springer-Verlag’s Lecture Notes in Computer Science - Africacrypt 2019

**Date: **received 15 May 2019

**Contact author: **shaunmiller2014 at fau edu

**Available format(s): **PDF | BibTeX Citation

**Version: **20190520:124529 (All versions of this report)

**Short URL: **ia.cr/2019/502

[ Cryptology ePrint archive ]