Cryptography from Rings Chris Peikert
University of Michigan
HEAT Summer School 13 Oct 2015
1 / 13
Cryptography from Rings Chris Peikert University of Michigan HEAT - - PowerPoint PPT Presentation
Cryptography from Rings Chris Peikert University of Michigan HEAT Summer School 13 Oct 2015 1 / 13 Agenda 1 Polynomial rings, ideal lattices and Ring-LWE 2 Basic Ring-LWE encryption 3 Fully homomorphic encryption Selected bibliography:
1 / 13
2 / 13
3 / 13
3 / 13
3 / 13
3 / 13
3 / 13
3 / 13
4 / 13
m
4 / 13
m
4 / 13
m
4 / 13
m
4 / 13
m
4 / 13
5 / 13
5 / 13
5 / 13
5 / 13
5 / 13
5 / 13
5 / 13
5 / 13
6 / 13
6 / 13
6 / 13
m.
6 / 13
m.
6 / 13
m.
6 / 13
m.
6 / 13
7 / 13
7 / 13
7 / 13
7 / 13
2 ± √−3 2 ) 8 / 13
2 ± √−3 2 )
8 / 13
2 ± √−3 2 )
8 / 13
2 ± √−3 2 )
8 / 13
2 ± √−3 2 )
8 / 13
9 / 13
9 / 13
9 / 13
9 / 13
10 / 13
10 / 13
10 / 13
10 / 13
10 / 13
10 / 13
10 / 13
11 / 13
⋆ If you can distinguish (ai , bi) from (ai , bi), then you can find s. 11 / 13
⋆ If you can distinguish (ai , bi) from (ai , bi), then you can find s. ⋆ If you can find s, then you can find approximately shortest vectors in
11 / 13
⋆ If you can distinguish (ai , bi) from (ai , bi), then you can find s. ⋆ If you can find s, then you can find approximately shortest vectors in
11 / 13
⋆ If you can distinguish (ai , bi) from (ai , bi), then you can find s. ⋆ If you can find s, then you can find approximately shortest vectors in
⋆ If you can break the crypto, then you can distinguish (ai , bi) from
11 / 13
12 / 13
12 / 13
12 / 13
12 / 13
12 / 13
13 / 13
13 / 13
13 / 13
13 / 13
13 / 13