Application of Discrete Pruned Enumeration in Solving BDD

نویسندگان

چکیده

The bounded distance decoding (BDD) is a fundamental problem in lattice-based cryptography which derived from the closest vector (CVP). In this paper, we adapt lattice enumeration with discrete pruning, burgeoning method for shortest (SVP), to solve BDD various cryptanalysis scenarios using direct method. We first transfer basic definition involved pruning technique SVP CVP, prove corresponding properties and give specific procedures of algorithm. Additionally, use interpret classical CVP algorithms, including Babai’s nearest plane Lindner–Peikert planes, can be regarded as pruned on some special sets. propose three probability models runtime analysis accurately estimate cost our algorithm different application scenarios. study mainly LWE-based cryptosystem DSA partially known nonces. experimental results show that new has higher efficiency than previous algorithms directly BDD, plane(s) strategies, are able recover secret less leaked information works.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Solving BDD by Enumeration: An Update

Bounded Distance Decoding (BDD) is a basic lattice problem used in cryptanalysis: the security of most lattice-based encryption schemes relies on the hardness of some BDD, such as LWE. We study how to solve BDD using a classical method for finding shortest vectors in lattices: enumeration with pruning speedup, such as Gama-NguyenRegev extreme pruning from EUROCRYPT ’10. We obtain significant im...

متن کامل

Pruned Discrete Random Samples

Let Xi, i ∈ N, be independent and identically distributed random variables with values in N0. We transform (‘prune’) the sequence {X1, . . . , Xn}, n ∈ N, of discrete random samples into a sequence {0, 1, 2, . . . , Yn}, n ∈ N, of contiguous random sets by replacing Xn+1 with Yn + 1 if Xn+1 > Yn. We consider the asymptotic behaviour of Yn as n → ∞. Applications include path growth in digital se...

متن کامل

Parallel Implementation of BDD Enumeration for LWE

One of the most attractive problems for post-quantum secure cryptographic schemes is the LWE problem. Beside combinatorial and algebraic attacks, LWE can be solved by a lattice-based Bounded Distance Decoding (BDD) approach. We provide the first parallel implementation of an enumeration-based BDD algorithm that employs the Lindner-Peikert and Linear Length pruning strategies. We ran our algorit...

متن کامل

Enumeration of Dominant Solutions: An Application in Transport Network Design

A One-Dimensional Binary Integer Programming Problem (1DB-IPP) is concerned with selecting a subset from a set of k items in budget constraint to optimize an objective function. In this problem a dominant solution is defined as a feasible selection to which no further item could be added in budget constraint. This paper presents a simple algorithm for Enumeration of Dominant Solutions (EDS) and...

متن کامل

A Mortar BDD method for solving flow in stochastic discrete fracture networks

In geological media, the large variety and complex configurations of fractured networks make it difficult to describe them precisely. A relevant approach is to model them as Discrete Fracture Networks (DFN)[10, 19], with statistical properties in agreement with in situ experiments [15, 13, 14]. A DFN is a 3D domain made of 2D fractures intersecting each other. Steady state flow in DFN is consid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2023

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym15020355