An experimental study of Kannan's embedding technique for the search LWE problem

Y Wang, Y Aono, T Takagi - … , ICICS 2017, Beijing, China, December 6-8 …, 2018 - Springer
Y Wang, Y Aono, T Takagi
Information and Communications Security: 19th International Conference, ICICS …, 2018Springer
The learning with errors (LWE) problem is considered as one of the most compelling
candidates as the security base for the post-quantum cryptosystems. For the application of
LWE based cryptographic schemes, the concrete parameters are necessary: the length n of
secret vector, the moduli q and the deviation σ σ. In the middle of 2016, Germany TU
Darmstadt group initiated the LWE Challenge in order to assess the hardness of LWE
problems. There are several approaches to solve the LWE problem via reducing LWE to …
Abstract
The learning with errors (LWE) problem is considered as one of the most compelling candidates as the security base for the post-quantum cryptosystems. For the application of LWE based cryptographic schemes, the concrete parameters are necessary: the length n of secret vector, the moduli q and the deviation . In the middle of 2016, Germany TU Darmstadt group initiated the LWE Challenge in order to assess the hardness of LWE problems. There are several approaches to solve the LWE problem via reducing LWE to other lattice problems. Xu et al.’s group solved some LWE Challenge instances using Liu and Nguyen’s adapted enumeration technique (reducing LWE to BDD problem) [14] and they published this result at ACNS 2017 [23]. In this paper, we study Kannan’s embedding technique (reducing LWE to unique SVP problem) to solve the LWE problem in the aspect of practice. The lattice reduction algorithm we use is the progressive BKZ [2, 3]. At first, from our experimental results we can intuitively observe that the embedding technique is more efficient with the embedding factor M closer to 1. Then especially for the cases of , we will give an preliminary analysis for the runtime and give an estimation for the proper size of parameters. Moreover, our experimental results show that for and the fixed , the embedding technique with progressive BKZ is more efficient than Xu et al.’s implementation of the enumeration algorithm in [21, 23]. Finally, by our parameter setting, we succeeded in solving the LWE Challenge over using  s (32.73 single core hours).
Springer