Weak instances of PLWE

34Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

In this paper we present a new attack on the polynomial version of the Ring-LWE assumption, for certain carefully chosen number fields. This variant of RLWE, introduced in [BV11] and called the PLWE assumption, is known to be as hard as the RLWE assumption for 2-power cyclotomic number fields, and for cyclotomic number fields in general with a small cost in terms of error growth. For general number fields, we articulate the relevant properties and prove security reductions for number fields with those properties.We then present an attack on PLWE for number fields satisfying certain properties.

Cite

CITATION STYLE

APA

Eisenträger, K., Hallgren, S., & Lauter, K. (2014). Weak instances of PLWE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8781, pp. 183–194). Springer Verlag. https://doi.org/10.1007/978-3-319-13051-4_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free