Dear all,
I believe that the proof of the IND-CPA security of Round2
contains a flaw.
In the security proof of ROUND2.CPA-PKE, you state that the
advantage of an adversary distinguishing between game G3 and G4 is
less or equal then his advantage of solving the specific dGLWR
problem mentioned in formula 13. However, the adversary has
possibly more information in the first case (distinguishing games
G3 and G4) since he is given extra information about the secret
key R embedded in v (line 6-7 in Game G3 and G4). Therefore, it is
possible that the advantage of the adversary in distinguishing
Game G3 and G4 is actually bigger than solving the dGLWR problem.
A similar problem can be found in the security proof of
ROUND2.CPA-KEM.
To work around this issue, the step from Game G3 to Game G5 could
be done in one step, comparing it with one similar dLWR problem
(with extra samples), similar to Bos et al. [1]. However, due to
the rounding, it becomes more involved when working with LWR.
For the uRound (powers of two) parameters, you can take the same
route as we did in the security prove of Saber (the paper
containing the proof has not been put on eprint yet). This proof
proceeds from game G3 by adding two additional games G3a and G3b.
In game G3a, B is generated uniformly from R^{d/nxn}_{n,q},
X is calculated as <B^T R>_q, and v is now send with
log2(t*q/p) bit coefficients. Here you can prove that the
advantage of the adversary in Game G3a is at least as big in Game
G3, since he can easily calculate the same values as in Game G3 by
taking mod p of B and mod t of v.
In game G3b, the amount of error introduced in the coefficients of
v, and the coefficients of U, is equalized. This can be done by
calculating both with Rcompress_q-->max(p,t*q/p). Again, the
advantage of the adversary in Game G3b is at least as big as in
Game G3a, since he can easily calculate the same values as in Game
G3a.
After this, you can go to Game G5 in one step analogue to
Algorithm C.
Kind regards,
Jan-Pieter D'Anvers
[1] Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael
Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas
Stebila. Frodo: Take off the ring! Practical, Quantum-Secure Key
Exchange from LWE. Cryptology ePrint Archive, Report 2016/659,
2016. http://eprint.iacr.
org/2016/659.