Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen-ciphertext attack using a fault. When the leaked...
Main Authors: | Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2023-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/11167 |
Similar Items
-
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
by: Wunderer Thomas
Published: (2019-03-01) -
Using Variational Quantum Algorithm to Solve the LWE Problem
by: Lihui Lv, et al.
Published: (2022-10-01) -
Adapting Belief Propagation to Counter Shuffling of NTTs
by: Julius Hermelink, et al.
Published: (2022-11-01) -
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
by: Utsav Banerjee, et al.
Published: (2019-08-01) -
<i>R</i>-LWE-Based Distributed Key Generation and Threshold Decryption
by: Ferran Alborch, et al.
Published: (2022-02-01)