Learning with Rounding, Revisited - New Reduction, Properties and Applications
نویسندگان
چکیده
The learning with rounding (LWR) problem, introduced by Banerjee, Peikert and Rosen [BPR12] at EUROCRYPT ’12, is a variant of learning with errors (LWE), where one replaces random errors with deterministic rounding. The LWR problem was shown to be as hard as LWE for a setting of parameters where the modulus and modulus-to-error ratio are super-polynomial. In this work we resolve the main open problem of [BPR12] and give a new reduction that works for a larger range of parameters, allowing for a polynomial modulus and modulus-to-error ratio. In particular, a smaller modulus gives us greater efficiency, and a smaller modulus-to-error ratio gives us greater security, which now follows from the worst-case hardness of GapSVP with polynomial (rather than super-polynomial) approximation factors. As a tool in the reduction, we show that there is a “lossy mode” for the LWR problem, in which LWR samples only reveal partial information about the secret. This property gives us several interesting new applications, including a proof that LWR remains secure with weakly random secrets of sufficient minentropy, and very simple new constructions of deterministic encryption, lossy trapdoor functions and reusable extractors. Our approach is inspired by a technique of Goldwasser et al. [GKPV10] from ICS ’10, which implicitly showed the existence of a “lossy mode” for LWE. By refining this technique, we also improve on the parameters of that work to only requiring a polynomial (instead of super-polynomial) modulus and modulus-to-error ratio.
منابع مشابه
Investigating the effect of rounding and revision in predicting earnings per share on investors' attention
Because in the theory of economics, the value of a company is based on the current value of future cash flows and profit is used as a substitute for cash flows, profit forecasting is of particular importance. In the research, the effect of rounding and revision in predicting earnings per share on the investors' attention in Iran has been investigated. After designing the investors' attention as...
متن کاملInhibition Revisited in EFL Learning/Teaching
In the affective sphere of EFL learning especially with regard to teaching/learning situations in Iran, one deterrent element seizes particular attention and that is inhibition self-imposed restraint on or abstinence from learning due to academic and non-academic variables such as culture, gender, psyche, extreme emotions, etc. It is related to language ego permeability hypothesis (LEPH) which ...
متن کاملA New Five-Parameter Distribution: Properties and Applications
In this paper, a new five-parameter lifetime and reliability distribution named “the exponentiated Uniform-Pareto distribution (EU-PD),” has been suggested that it has a bathtub-shaped and inverse bathtub-shape for modeling lifetime data. This distribution has applications in economics, actuarial modelling, reliability modeling, lifetime and biological sciences. Firstly, the mathematical and st...
متن کاملDependent Rounding in Bipartite Graphs
We combine the pipage rounding technique of Ageev & Sviridenko witha recent rounding method developed by Srinivasan, to develop a new randomized rounding approach for fractional vectors defined on the edge-sets of bipartite graphs. We show various ways of combining this technique with other ideas, leading to the following applications: richer random-graph models for graphs with a given degree-s...
متن کاملOverview of learning theories and its applications in medical education
Introduction: The purpose of teaching is learning, and learning is related to learning theories. These theories describe and explain how people learn. According to various experts' opinion about learning, many theories emerged. The paper reviewed three major approaches include behaviorism, cognitive and constructive learning and its educational applications in medical science. Methods: this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013