Weak instances of PLWE

K Eisenträger, S Hallgren, K Lauter - International Conference on Selected …, 2014 - Springer
… Each such polynomial \(f(x)\) gives rise to a weak instance of PLWE, according to our attack.
However, to obtain an attack on RLWE, we would need to check that the first 4 properties …

Provably weak instances of Ring-LWE revisited

W Castryck, I Iliashenko, F Vercauteren - … , Vienna, Austria, May 8-12, 2016 …, 2016 - Springer
… q such that the decision version of PLWE is weak. The attack can be … Applying \(\phi \) to the
PLWE samples results in equations of … too much modulo q, this attack breaks decision PLWE. …

Provably weak instances of Ring-LWE

Y Elias, KE Lauter, E Ozman, KE Stange - … , CA, USA, August 16-20, 2015 …, 2015 - Springer
… Furthermore, if the algorithm returns NOT PLWE, then the samples were not valid Poly-LWE
samples. If it outputs anything other than NOT PLWE, then the samples are valid Poly-LWE …

On the ring-LWE and polynomial-LWE problems

M Rosca, D Stehlé, A Wallet - … International Conference on the Theory and …, 2018 - Springer
… at least as hard as \(\mathsf {PLWE}\) for any f in an exponentially large … We construct
the OHCP instance from the decision \(\mathsf {… the plausibility of weak fields for \(\mathsf {RLWE}\). …

Analysis of the Evaluation Attack on PLWE Problem

서민재 - 2018 - s-space.snu.ac.kr
… more number fields weak to the … instances weak against the methods. And they showed
that RLWE attack is also possible using the isomorphism between PLWE and RLWE instances

Error analysis of weak Poly-LWE instances

Y Chen, BM Case, S Gao, G Gong - Cryptography and Communications, 2019 - Springer
… Having established the mapped distribution, we demonstrate how effective distinguishers
can be built for weak instances recognized by our method, with or without information of the …

Attacks against search Poly-LWE

M Kudo - Cryptology ePrint Archive, 2016 - eprint.iacr.org
… decision-PLWE problem succeed with sufficiently high probability in polynomial time under
certain assumptions, one of which is that the defining polynomial of the PLWE instance splits …

Fully homomorphic encryption from ring-LWE and security for key dependent messages

Z Brakerski, V Vaikuntanathan - Annual cryptology conference, 2011 - Springer
… We emphasize that PLWE is implicit in [26] and we just make … We notice that (a ,as + 2e)
is exactly a PLWE instance, so it is … The above implies a very weak form of KDM: that it is …

How (not) to instantiate ring-LWE

C Peikert - International Conference on Security and Cryptography …, 2016 - Springer
… As we shall see, the attacks are all instances of the following framework. … We remark
that Condition (2) is actually a bit weaker than what is required by [16, Theorem 4.1] (worst-case …

Ring-LWE cryptography for the number theorist

Y Elias, KE Lauter, E Ozman, KE Stange - Directions in Number Theory …, 2016 - Springer
… x) and the reduction from RLWE to PLWE was extended by weakening … PLWE holds and
RLWE samples can be converted to PLWE samples, thus providing examples of weak instances