Content deleted Content added
Completed section on Ring LWE problem |
No edit summary |
||
Line 20:
=== The RLWE Problem ===
The RLWE problem can be stated in two different ways. One is called the "Search"
* <math>a_i(x)</math> be a set of random but '''known''' polynomials from <math>Z_q[x]/\Phi(x)</math> with coefficients from all of <math>F_q</math>.
* <math>e_i(x)</math> be a set of small random and '''unknown''' polynomials relative to a bound <math>b</math> in the ring <math>Z_q[x]/\Phi(x)</math>
Line 27:
<nowiki> </nowiki>Given the list of polynomial pairs <math>( a_i(x), b_i(x) )</math> find the unknown polynomial <math>s(x)</math>
Using the same definitions, the Decision
The difficulty of this problem is characterized by the choice of the quotient polynomial ( <math>\Phi(x)</math> ), its degree (n), the field (<math>F_q</math>), and the smallness bound (<math>b</math>). In many RLWE based public key algorithms the private key will be a pair of small polynomials <math>s(x)</math> and <math>e(x)</math>. The corresponding public key will be a pair of polynomials <math>a(x)</math>, selected randomly from <math>Z_q[x]/\Phi(x)</math>, and the polynomial <math>t(x)= (a(x)\cdot s(x)) + e(x)</math>. Given <math>a(x)</math> and <math>t(x)</math> it should be computationally
=== Security Reduction ===
The difficulty of solving the RLWE problem is believed to be related to the difficulty of fi�nding a short non-zero vector in alattice associated with an ideal in the polynomial
short non-zero vector in a lattice associated to an ideal in a cyclotomic ring. E.g., the distinguishing
attack from [39] requires a short vector of a certain length to achieve a given
distinguishing advantage. Hence, parameters for R-LWE-based schemes are chosen such that
polynomial run-time exponential-approximation algorithms such as LLL [31] are unlikely to
�nd such short vectors (cf. [52, 32]). The known algorithms which are capable of �nding exact
solutions to the lattice problem all have exponential run time.
=== RLWE Cryptography ===
|