Fundamentals of Lattice-Based Cryptography Chris Peikert
University of Michigan 2nd Crypto Innovation School Shanghai, China 13 December 2019
1 / 23
Fundamentals of Lattice-Based Cryptography Chris Peikert - - PowerPoint PPT Presentation
Fundamentals of Lattice-Based Cryptography Chris Peikert University of Michigan 2nd Crypto Innovation School Shanghai, China 13 December 2019 1 / 23 Talk Outline 1 Lattices and hard problems 2 The SIS and LWE problems; basic applications 3
1 / 23
1 Lattices and hard problems 2 The SIS and LWE problems; basic applications 3 Using rings for efficiency
2 / 23
3 / 23
N = 21305750140972822779 67336009072353225107 58864221620325802176 55802658737520126407 22059995071405557278 967027854563351343547 P = 16062216870909044065 12585584569433331615 827658775597032991663 Q = 13264514053200565459 67263583507984286802 756201383768089567669 3 / 23
N = 21305750140972822779 67336009072353225107 58864221620325802176 55802658737520126407 22059995071405557278 967027854563351343547 P = 16062216870909044065 12585584569433331615 827658775597032991663 Q = 13264514053200565459 67263583507984286802 756201383768089567669
3 / 23
4 / 23
(Images courtesy xkcd.org) 4 / 23
(Images courtesy xkcd.org) 4 / 23
(Images courtesy xkcd.org) 4 / 23
(Images courtesy xkcd.org) 4 / 23
(Images courtesy xkcd.org) 4 / 23
5 / 23
O 6 / 23
k
O b1 b2 6 / 23
k
O b1 b2 6 / 23
k
O b1 b2 6 / 23
k
O b1 b2
6 / 23
k
O b1 b2
6 / 23
7 / 23
7 / 23
7 / 23
7 / 23
7 / 23
8 / 23
q = n-dimensional integer vectors modulo q.
9 / 23
q = n-dimensional integer vectors modulo q.
q
9 / 23
q = n-dimensional integer vectors modulo q.
q
9 / 23
q = n-dimensional integer vectors modulo q.
q
9 / 23
q = n-dimensional integer vectors modulo q.
q
q for any m > n lg q as
9 / 23
q = n-dimensional integer vectors modulo q.
q
q for any m > n lg q as
9 / 23
q = n-dimensional integer vectors modulo q.
q
q for any m > n lg q as
9 / 23
10 / 23
q
O 10 / 23
q
O (0, q) (q, 0) 10 / 23
q
O (0, q) (q, 0) 10 / 23
q
O (0, q) (q, 0)
q
10 / 23
11 / 23
q .
11 / 23
q .
11 / 23
q .
11 / 23
q .
11 / 23
⋆ Output distribution leaks no information about secret basis T! 12 / 23
⋆ Output distribution leaks no information about secret basis T!
u (A) t1 t2 O 12 / 23
⋆ Output distribution leaks no information about secret basis T!
u (A) t1 t2 O 12 / 23
⋆ Output distribution leaks no information about secret basis T!
u (A) t1 t2 O 12 / 23
⋆ Output distribution leaks no information about secret basis T!
u (A) t1 t2 O x 12 / 23
⋆ Output distribution leaks no information about secret basis T!
u (A) t1 t2 O x
u (plane) depends (essentially) only on dist(O, plane);
12 / 23
13 / 23
q given many ‘noisy inner products’
q
q
13 / 23
q given many ‘noisy inner products’
q
q
13 / 23
q given many ‘noisy inner products’
13 / 23
q given many ‘noisy inner products’
13 / 23
q given many ‘noisy inner products’
(quantum [R’05])
[BFKL’93,R’05,. . . ]
13 / 23
q given many ‘noisy inner products’
(quantum [R’05])
[BFKL’93,R’05,. . . ]
13 / 23
q given many ‘noisy inner products’
(quantum [R’05])
[BFKL’93,R’05,. . . ]
13 / 23
14 / 23
14 / 23
14 / 23
14 / 23
q
15 / 23
q
(public key, uniform when m > n log q) 15 / 23
q
q
(public key, uniform when m > n log q)
(ciphertext ‘preamble’) 15 / 23
q
q
(public key, uniform when m > n log q)
(ciphertext ‘preamble’)
2
(‘payload’) 15 / 23
q
q
(public key, uniform when m > n log q)
(ciphertext ‘preamble’)
2
2
(‘payload’) 15 / 23
q
q
(public key, uniform when m > n log q)
(ciphertext ‘preamble’)
2
2
(‘payload’)
15 / 23
q
q
(public key, uniform when m > n log q)
(ciphertext ‘preamble’)
2
2
(‘payload’)
15 / 23
16 / 23
A l i c e
C a r
16 / 23
A l i c e
C a r
16 / 23
A l i c e
C a r
16 / 23
A l i c e
C a r
1 [BonehFranklin’01,. . . ]: first IBE, based on pairings
16 / 23
A l i c e
C a r
1 [BonehFranklin’01,. . . ]: first IBE, based on pairings 2 [Cocks’01,BGH’07]: based on quadratic residuosity mod N = pq
16 / 23
A l i c e
C a r
1 [BonehFranklin’01,. . . ]: first IBE, based on pairings 2 [Cocks’01,BGH’07]: based on quadratic residuosity mod N = pq 3 [GPV’08]: based on lattices!
16 / 23
(‘identity’ public key)
(ciphertext preamble)
2
2
(‘payload’)
17 / 23
18 / 23
19 / 23
19 / 23
19 / 23
19 / 23
q
20 / 23
q
20 / 23
q
20 / 23
q
20 / 23
q
20 / 23
21 / 23
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms 21 / 23
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms
21 / 23
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms
21 / 23
(quantum, any R = OK)
(classical, any cyclotomic R)
22 / 23
(quantum, any R = OK)
(classical, any cyclotomic R)
(quantum, any R = OK)
22 / 23
(quantum, any R = OK)
(classical, any cyclotomic R)
(quantum, any R = OK)
22 / 23
23 / 23
23 / 23
23 / 23