{"updated":"2025-03-06T05:34:59.314984+00:00","links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240866","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240866","title":["三分木を用いたMeet-LWE攻撃の改良"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"e4330547-6c2d-4ce9-a2c2-d5235ec00412"},"_deposit":{"id":"240866","pid":{"type":"depid","value":"240866","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"三分木を用いたMeet-LWE攻撃の改良","author_link":["661819","661820","661821","661822","661823","661824"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"三分木を用いたMeet-LWE攻撃の改良","subitem_title_language":"ja"},{"subitem_title":"Revisiting the Meet-LWE Attack","subitem_title_language":"en"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"誠信女子大学校"},{"subitem_text_value":"誠信女子大学校"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"Sungshin Women's University","subitem_text_language":"en"},{"subitem_text_value":"Sungshin Women's University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240866/files/IPSJ-CSS2024120.pdf","label":"IPSJ-CSS2024120.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024120.pdf","filesize":[{"value":"500.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"6286a652-06f5-48a5-bb93-208c73d2113a","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"王, イントウ"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"李, 恩岷"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"李, 珠姬"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuntao, Wang","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Eunmin, Lee","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Joohee, Lee","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Learning with Errors (LWE) 問題およびその変種は,構造化格子上で効率的な耐量子計算機暗号システムに広く採用されている.CRYPTO 2021にてMayはMeet-LWE攻撃を提案し,三進秘密鍵のLWEに対するMeet-in-the-Middleアプローチを用いたLWEの解析において重要な進展を示した.本研究では,三分木を導入することによりMeet-LWE攻撃を拡張し,秘密ベクトルのより多様な表現が可能となる.具体的には,秘密ベクトルを同次元で三分木に分割し展開することで,表現の増加を利用し,攻撃の複雑性全体を漸近的にS0.25からS0.21まで抑えられる(Sは探索スペースとなる).また,いくつか耐量子計算機暗号に対し,我々の攻撃による実行時間・メモリコストの非漸近的な評価でMeet-LWE攻撃より 29.9%までセキュリティのビット数が削減された.さらに,韓国における耐量子計算機暗号標準化プロジェクトのラウンド2においた候補の推奨パラメータに対してセキュリティを評価し,攻撃複雑性が主張されたものよりも低いことを報告する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The Learning with Errors (LWE) problem with its variants over structured lattices has been widely exploited in efficient post-quantum cryptosystems. In CRYPTO 2021, May proposed the Meet-LWE attack, which poses a significant advancement in the line of work on the Meet-in-the-Middle approach to analyze LWE with ternary secrets. In this work, we improve Meet-LWE by introducing ternary trees, which result in diverse representations of the secrets. More precisely, we split the secrets into three pieces with the same dimension and expanded them into a ternary tree to leverage the increased representations to improve the overall attack complexity. With asymptotic and non-asymptotic comparisons, our attack provides significantly improved estimations for all parameter settings, including those of the practical post-quantum schemes, compared to the Meet-LWE attack.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"898","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"891","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240866,"created":"2025-01-19T01:45:18.125130+00:00"}