Practical hardness results are necessary to select parameters for cryptographic schemes. Cryptographic challenges proved to be useful for determining the practical hardness of computational problems that are used to build public-key cryptography. However, several of these problems have the drawback that it is not known how to create a challenge for them without knowing the solutions. Hence, for these problems the creators of the challenges are excluded from participating. In this work, we present a method to create cryptographic challenges without excluding anyone from participating. This method is based on secure multi-party computation (MPC). We demonstrate that the MPC-based approach is indeed feasible by using it to build a challenge for the learning with errors (LWE) problem. The LWE problem is one of the most important problems in lattice-based cryptography. The security of many cryptographic schemes that have been proposed in the last decade is directly based on it. We identify parameters for LWE instances that provide the appropriate hardness level for a challenge while representing instances used to instantiate encryption schemes as close as possible. The LWE challenge is designed to determine the practical hardness of LWE, to gain an overview of the best known LWE solvers, and to motivate additional research effort in this direction.
|Title of host publication||AsiaPKC '16 Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 30 May 2016, Xi'an, China|
|Place of Publication||New York|
|Publisher||Association for Computing Machinery, Inc|
|Publication status||Published - 2016|
Buchmann, J., Buscher, N., Göpfert, F., Katzenbeisser, S., Kramer, J., Micciancio, D., Siim, S., van Vredendaal, C., & Walter, M. (2016). Creating cryptographic challenges using multi-party computation : the LWE challenge. In AsiaPKC '16 Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 30 May 2016, Xi'an, China (pp. 11-20). Association for Computing Machinery, Inc. https://doi.org/10.1145/2898420.2898422