Bar-Ilan University
- Dept. of Computer Science
Craig Gentry
IBM Watson
Winter School on Lattice-Based Cryptography and Applications Bar-Ilan University, Israel
19/2/2012-22/2/2012
Craig Gentry IBM Watson Bar-Ilan University Dept. of Computer - - PowerPoint PPT Presentation
Winter School on Lattice-Based Cryptography and Applications Bar-Ilan University, Israel 19/2/2012-22/2/2012 Bar-Ilan University Dept. of Computer Science Craig Gentry IBM Watson Bar-Ilan University Dept. of Computer Science
Bar-Ilan University
Winter School on Lattice-Based Cryptography and Applications Bar-Ilan University, Israel
19/2/2012-22/2/2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
n+1) such that [fi(s1, …, sn)]q = ei.
n+1).
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
L ≈ ηL.
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Output sum or product of
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Output sum or product of
By CRT, ADD and MULT operate
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Great for computing same function F
We can do SIMD homomorphically.
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
i)
i)
i) a(αn
i)
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Bar-Ilan University
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Decryption function computable in depth O(log k).
BGV12 performance with bootstrapping:
Security can be based on
Bar-Ilan University
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Elementary symmetric polynomial ek(x1, …, xn): sum of all
Cool fact: ek(x) mod p can be computed by a depth-3
How? If P(z) = Pi(z+x1), then ek(x) is the coefficient of zn-k Computing P(z): evaluate P(z) in n+1 points, interpolate
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012
We can “compress” the entire FHE ciphertext down
Choose aj’s cleverly so that all products P(aj) can be
Note: P(aj) can be computed homomorphically from
Set aj such that we know (wj, ej) such that
ej mod p, and
ej/((a1+1)ej – a1 ej) and wj = aj/a1 ej.
Then, P(aj) = wj d∙P(a1)ej mod p
Bar-Ilan University
Lattice-Based Crypto & Applications Bar-Ilan University, Israel 2012