LAC

From PQC WIKI
Revision as of 23:34, 12 May 2021 by Admin (talk | contribs) (1 revision imported)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Information

Authors

  • Carlos Aguilar Melchor, University of Toulouse (FR)
  • Nicolas Aragon, University of Limoges & DGA (FR)
  • Slim Bettaieb, Worldline (FR)
  • Loïc Bidoux, Worldline (FR)
  • Olivier Blazy, University of Limoges (FR)
  • Jean-Christophe Deneuville, INSA-CVL & University of Limoges (FR)
  • Philippe Gaborit, University of Limoges (FR)
  • Edoardo Persichetti, Florida Atlantic University (US)
  • Gilles Zémor, University of Bordeaux (FR)


Official Links

Related Articles

Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault.
Cryptology ePrint Archive: Report 2020/063, 21 Jan 2020.

A Novel CCA Attack using Decryption Errors against LAC
Qian Guo and Thomas Johansson and Jing Yang.
ASIACRYPT 2019, November 2019.

LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li and Kunpeng Wang.
Cryptology ePrint Archive: Report 2018/1009, Oct 2018.

On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D’Anvers, Frederik Vercauteren, and Ingrid Verbauwhede.
Cryptology ePrint Archive: Report 2018/1089, Nov 2018.


Summary Table

LAC

ROUND 1 ROUND 2
Description lattice

poly-LWE

Assumption poly-LWE
Functionality KEM
Public Key

(bytes)

  • level 1: 544
  • level 3: 1056
  • level 5: 1056
  • level 1: 544
  • level 3: 1056
  • level 5: 1056
Secret Key

(bytes)

  • level 1: 1056
  • level 3: 2080
  • level 5: 2080
  • level 1: 512
  • level 3: 1024
  • level 5: 1024
CIPH/SIG

(bytes)

  • level 1: 1024
  • level 3: 1536
  • level 5: 2048
  • level 1: 712
  • level 3: 1188
  • level 5: 1424
Security

Type

IND-CCA

Related Articles