Paper 2024/824

Improved Meet-LWE Attack via Ternary Trees

Eunmin Lee, Sungshin Women's University
Joohee Lee, Sungshin Women's University
Yuntao Wang, The University of Electro-Communications
Abstract

The Learning with Errors (LWE) problem with its variants over structured lattices has been widely exploited in efficient post-quantum cryptosystems. Recently, May suggests the Meet-LWE attack, which poses a significant advancement in the line of work on the Meet-in-the-Middle approach to analyze LWE with ternary secrets. In this work, we generalize and extend the idea of Meet-LWE by introducing ternary trees, which result in diverse representations of the secrets. More precisely, we split the secrets into three pieces with the same dimension and expand them into a ternary tree to leverage the increased representations to improve the overall attack complexity. We carefully analyze and optimize the time and memory costs of our attack algorithm exploiting ternary trees, and compare them to those of the Meet-LWE attack. With asymptotic and non-asymptotic comparisons, we observe that our attack provides improved estimations for all parameter settings, including those of the practical post-quantum schemes, compared to the Meet-LWE attack. We also evaluate the security of the Round 2 candidates of the KpqC competition which aims to standardize post-quantum public key cryptosystems in the Republic of Korea, and report that the estimated complexities for our attack applied to SMAUG-T are lower than the claimed for some of the recommended parameters.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Learning with ErrorsMeet-LWEMeet-in-the-MiddleKpqC Competition
Contact author(s)
20211089 @ sungshin ac kr
jooheelee @ sungshin ac kr
y-wang @ uec ac jp
History
2024-05-27: approved
2024-05-27: received
See all versions
Short URL
https://ia.cr/2024/824
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/824,
      author = {Eunmin Lee and Joohee Lee and Yuntao Wang},
      title = {Improved Meet-{LWE} Attack via Ternary Trees},
      howpublished = {Cryptology ePrint Archive, Paper 2024/824},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/824}},
      url = {https://eprint.iacr.org/2024/824}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.