The Learning With Errors (LWE) problem is one of the major hard problems in post-quantum cryptography. For example, 1) the only Key Exchange Mechanism KEM standardized by NIST [14] is based on LWE; and 2) current publicly available Homomorphic Encryption (HE) libraries are based on LWE. NIST KEM schemes use random secrets, but homomorphic encryption schemes use binary or ternary secrets, for efficiency reasons. In particular, sparse binary secrets have been proposed, but not standardized [2], for HE. Prior work SALSA [49] demonstrated a new machine learning attack on sparse binary secrets for the LWE problem in small dimensions (up to n = 128) and low Hamming weights (up to h = 4). However, this attack assumed access to millions of LWE samples, and was not scaled to higher Hamming weights or dimensions. Our attack, PICANTE, reduces the number of samples required to just m = 4n samples. Moreover, it can recover secrets with much larger dimensions (up to 350) and Hamming weights (roughly n/10, or h = 33 for n = 300). To achieve this, we introduce a preprocessing step which allows us to generate the training data from a linear number of samples and changes the distribution of the training data to improve transformer training. We also improve the distinguisher/secret recovery methods of SALSA and introduce a novel cross-attention recovery mechanism which allows us to read-off the secret directly from the trained models.
翻译:学习错误(LWE)问题是后QQ型加密(LWE)中的一个主要难题。例如,1,由 NIST 标准化的唯一关键交换机制KEM [14] 以LWE为基础;2, 现有公开的单调加密(HE)图书馆以LWE为基础。 NIST KEM 计划使用随机秘密,但同质加密计划使用二进制或永恒秘密,以提高效率为目的。特别是,为HE提出了稀释的二进制秘密,但没有标准化[2]。以前SALSA [49]的工作表明,对LWE问题小规模(最高为n=128)和低含汞重量(最高为h=4)的稀释二进式秘密交换机制进行了新的机器学习。但是,这次攻击假定了数百万LWE样本的接触,但并没有扩大到更高的含汞重量或尺寸。我们的攻击,即PICANTE, 将所需的样品数量减少到 m=4n 样本。此外,SAL [350] 先前的工作表明,对稀释的机密秘密秘密二秘诀密进行新的学习,从300-10,也可以将SAL 升级为我们进行数据转换。</s>