Security Analysis of Integer Learning with Errors with Rejection Sampling

📅 2025-12-08
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work systematically evaluates the practical security of integer learning-with-errors (ILWE)-based digital signature schemes—such as CRYSTALS-Dilithium—under rejection sampling in small-parameter settings. Method: We propose a novel technique to directly construct ILWE instances from valid signatures, eliminating reliance on side-channel information. To model the ILWE problem, we introduce real-valued matrix approximations of modular polynomial arithmetic and formulate solving as a linear least-squares optimization. We further design an efficient, large-scale numerical solver for this formulation. Contribution/Results: Experiments confirm that, under standard parameter sets, the attack does not breach the provable security bounds, thereby validating the feasibility of small-parameter ILWE-based signatures. Our modeling and analysis framework provides a reproducible, side-channel-free quantitative assessment tool for deploying post-quantum cryptographic primitives—particularly in resource-constrained domains such as intelligent transportation systems.

Technology Category

Application Category

📝 Abstract
At ASIACRYPT 2018, a digital attack based on linear least squares was introduced for a variant of the learning with errors (LWE) problem which omits modular reduction known as the integer learning with errors problem (ILWE). In this paper, we present a theoretical and experimental study of the effectiveness of the attack when applied directly to small parameter ILWE instances found in popular digital signature schemes such as CRYSTALS-Dilithium which utilize rejection sampling. Unlike other studies which form ILWE instances based on additional information obtained from side-channel attacks, we take a more direct approach to the problem by constructing our ILWE instance from only the obtained signatures. We outline and introduce novel techniques in our simulation designs such as modular polynomial arithmetic via matrices in $mathbb{R}$, as well as algorithms for handling large sample sizes efficiently. Our experimental results reinforce the proclaimed security of signature schemes based on ILWE. We additionally discuss the implications of our work and digital signatures as a whole in regards to real-world applications such as in Intelligent Transportation Systems (ITS).
Problem

Research questions and friction points this paper is trying to address.

Analyze ILWE attack effectiveness on digital signatures
Develop novel simulation techniques for ILWE analysis
Reinforce security of ILWE-based signature schemes
Innovation

Methods, ideas, or system contributions that make the work stand out.

Modular polynomial arithmetic via real matrices
Algorithms for efficiently handling large sample sizes
Direct ILWE instance construction from signatures only
🔎 Similar Papers
No similar papers found.
K
Kyle Yates
School of Mathematical and Statistical Sciences, Clemson University, Clemson, South Carolina, 29634
A
Antsa Pierrottet
School of Mathematical and Statistical Sciences, Clemson University, Clemson, South Carolina, 29634
A
Abdullah Al Mamun
Glenn Department of Civil Engineering, Clemson University, Clemson, South Carolina, 29634
Ryann Cartor
Ryann Cartor
Assistant Professor, School of Mathematical and Statistical Sciences, Clemson University
Post-Quantum Cryptography
Mashrur Chowdhury
Mashrur Chowdhury
Founding Director, National Center for Transportation Cybersecurity and Resiliency
CPS CybersecurityTransportation Cyber-Physical-Social SystemsConnected Autonomous Vehicles
Shuhong Gao
Shuhong Gao
Clemson University
Coding theorycryptographyblockchainsquantum computingcomputational algebra.