Content deleted Content added
No edit summary |
added first reference |
||
Line 29:
Using the same definitions, the Decision version of the problem can be stated as follows. Given a list of polynomial pairs <math>( a_i(x), b_i(x) )</math> determine whether the <math>b_i(x)</math> polynomials were constructed as <math>b_i(x) = (a_i(x)\cdot s(x)) + e_i(x)</math> or were generated randomly from <math>Z_q[x]/\Phi(x)</math> with coefficients from all of <math>F_q</math>.
The difficulty of this problem is
=== Security Reduction ===
The difficulty of solving the RLWE problem is believed to be related to the difficulty of
Lyubashevsky, Peikert, and Regev, present the security of the Ring Learning with Errors Problem as follows:
"Suppose that it is hard for polynomial-time quantum algorithms to approximate (the search version of) the shortest vector problem (SVP) in the worst case on ideal lattices in R to within a fixed poly(n) factor. Then any poly(n) number of samples drawn from the R-LWE distribution are pseudorandom to any polynomial-time (possibly quantum) attacker."<ref>{{Cite journal|title = On Ideal Lattices and Learning with Errors Over Rings|url = http://eprint.iacr.org/2012/230|date = 2012|first = Vadim|last = Lyubashevsky|first2 = Chris|last2 = Peikert|first3 = Oded|last3 = Regev}}</ref>
E.g., the distinguishing
attack from [39] requires a short vector of a certain length to achieve a given
distinguishing advantage. Hence, parameters for R-LWE-based schemes are chosen such that
|