Paper 2020/230
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
Abstract
In ASIACRYPT 2019, Genise et al. describe GGH+19 a new somewhat homomorphic encryption scheme. The security relies on an inhomogeneous and non-structured variant of the NTRU assumption that they call MiNTRU. To allow for meaningful homomorphic computations, they use overstretched parameters, but they do not provide an analysis of their new assumption against the state-of-the-art attack of Kirchner and Fouque KF17 for overstretched modulus. We show that the parameters of GGH+19 do not satisfy the desired security by actually conducting the known analysis. We also report a successful break of the smallest set of parameters in around 15 hours of computations while they are claimed to reach 100 bits of security.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- MiNTRUlattice analysis
- Contact author(s)
-
changmin lee @ ens-lyon fr
wallet alexandre @ gmail com - History
- 2020-02-29: last of 2 revisions
- 2020-02-21: received
- See all versions
- Short URL
- https://ia.cr/2020/230
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/230, author = {Changmin Lee and Alexandre Wallet}, title = {Lattice analysis on {MiNTRU} problem}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/230}, year = {2020}, url = {https://eprint.iacr.org/2020/230} }