Paper 2020/230

Lattice analysis on MiNTRU problem

Changmin Lee and Alexandre Wallet

Abstract

In ASIACRYPT 2019, Genise et al. describe GGH+19 a new somewhat homomorphic encryption scheme. The security relies on an inhomogeneous and non-structured variant of the NTRU assumption that they call MiNTRU. To allow for meaningful homomorphic computations, they use overstretched parameters, but they do not provide an analysis of their new assumption against the state-of-the-art attack of Kirchner and Fouque KF17 for overstretched modulus. We show that the parameters of GGH+19 do not satisfy the desired security by actually conducting the known analysis. We also report a successful break of the smallest set of parameters in around 15 hours of computations while they are claimed to reach 100 bits of security.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
MiNTRUlattice analysis
Contact author(s)
changmin lee @ ens-lyon fr
wallet alexandre @ gmail com
History
2020-02-29: last of 2 revisions
2020-02-21: received
See all versions
Short URL
https://ia.cr/2020/230
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/230,
      author = {Changmin Lee and Alexandre Wallet},
      title = {Lattice analysis on {MiNTRU} problem},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/230},
      year = {2020},
      url = {https://eprint.iacr.org/2020/230}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.