Do you have any mathematical proof of the security of NTRUEncrypt and NTRUSign?
NTRUEncrypt uses techniques derived from an approach due to Fujisaki and Okamoto, which give the property of Indistinguishability against Adaptive Chosen Ciphertext Attack (IND-CCA2). Details are in [1] and [2]. [1] E.Fujisaki,T.Okamoto, How to Enhance the Security of Public-Key Encryption at Minimum Cost, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E83-A, No.1, Special Issue on Cryptography and Information Security (January 2000) [2] NTRU Technical Note 16, available from Technical Notes (all tech notes) NTRUTech016.pdf (PDF of #16) The security relies on various assumptions, of which the most important are: – the hash function used behaves as a random oracle; – the Shortest Vector Problem and Closest Vector Problem are hard to solve in the NTRU lattice. NTRUSign, in the random oracle model, also reduces to the assumption that SVP and CVP are hard problems in the NTRU lattice. NTRU Tech Notes 12 and 13 give the results of numerical expe