increased efficiency and functionality through lattice
play

Increased efficiency and functionality through lattice-based - PowerPoint PPT Presentation

Increased efficiency and functionality through lattice-based cryptography Michele Minelli ENS, CNRS, PSL Research University, INRIA (Internship at CryptoExperts, Paris) ECRYPT-NET School on Correct and Secure Implementation Crete, Greece 8


  1. Increased efficiency and functionality through lattice-based cryptography Michele Minelli ENS, CNRS, PSL Research University, INRIA (Internship at CryptoExperts, Paris) ECRYPT-NET School on Correct and Secure Implementation – Crete, Greece 8 – 12 October 2017

  2. Why lattice-based cryptography?

  3. Why lattice-based cryptography? Conjectured hardness against quantum attacks

  4. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc.

  5. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc. Strong security guarantees from worst-case hardness

  6. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc. Strong security guarantees from worst-case hardness Versatility

  7. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc. Strong security guarantees from worst-case hardness Versatility We can build FHE

  8. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc. Strong security guarantees from worst-case hardness Versatility We can build FHE!

  9. Why lattice-based cryptography? Conjectured hardness against quantum attacks Simplicity, efficiency and parallelism: linear ops, rings, etc. Strong security guarantees from worst-case hardness Versatility We can build FHE! But we can build FHE also from other assumptions...

  10. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers .

  11. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD

  12. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m

  13. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption:

  14. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption: Hom. + : c 1 + c 2 = s ( r 11 + r 21 ) + q ( r 12 + r 22 ) + ( m 1 + m 2 )

  15. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption: Hom. + : c 1 + c 2 = s ( r 11 + r 21 ) + q ( r 12 + r 22 ) + ( m 1 + m 2 ) Hom. × : c 1 · c 2 = s ( · · · ) + q ( · · · ) + ( m 1 · m 2 )

  16. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption: Hom. + : c 1 + c 2 = s ( r 11 + r 21 ) + q ( r 12 + r 22 ) + ( m 1 + m 2 ) Hom. × : c 1 · c 2 = s ( · · · ) + q ( · · · ) + ( m 1 · m 2 ) Warning: huge numbers ahead

  17. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption: Hom. + : c 1 + c 2 = s ( r 11 + r 21 ) + q ( r 12 + r 22 ) + ( m 1 + m 2 ) Hom. × : c 1 · c 2 = s ( · · · ) + q ( · · · ) + ( m 1 · m 2 ) Parameter selection for FHE: | c | ≈ 2 · 10 7 bits | s | ≈ 2700 bits , | r 2 | ≈ 70 bits ,

  18. The DGHV scheme (extended to Z q ) Fully Homomorphic Encryption over the integers . Assumptions: approximate GCD Encryption: c = s · r 1 + q · r 2 + m return ( c mod s ) mod q Decryption: Hom. + : c 1 + c 2 = s ( r 11 + r 21 ) + q ( r 12 + r 22 ) + ( m 1 + m 2 ) Hom. × : c 1 · c 2 = s ( · · · ) + q ( · · · ) + ( m 1 · m 2 ) Parameter selection for FHE: | c | ≈ 2 · 10 7 bits | s | ≈ 2700 bits , | r 2 | ≈ 70 bits , But we don’t really need this

  19. The use case Final goal Enabling cooperation between law enforcement agencies

  20. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data.

  21. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009)

  22. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009)

  23. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009) April 28 November 25 June 18

  24. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009) April 28 November 25 June 18

  25. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009) April 28 November 25 June 18

  26. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009) 150 000 people intercepted! April 28 November 25 June 18

  27. The use case Final goal Enabling cooperation between law enforcement agencies, while maintaining an adequate level of privacy for citizens’ personal data. Concrete example (2009) 150 000 people intercepted! April 28 November 25 June 18 The intersection gives the criminals but... privacy?

  28. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain.

  29. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration

  30. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data

  31. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice

  32. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice Should use state-of-the-art but...

  33. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice Should use state-of-the-art but... AES-256 and RSA-1024

  34. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice Should use state-of-the-art but... AES-256 and RSA-1024 H : SHA-1

  35. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice Should use state-of-the-art but... AES-256 and RSA-1024 H : SHA-1

  36. Current situation EU Council Decision 2008/615/JHA Picks up a treaty signed in 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands and Spain. Goal: cross-border cooperation against terrorism, crime and illegal migration Tools: DNA, fingerprints and vehicle registration data In practice Should use state-of-the-art but... AES-256 and RSA-1024 H : SHA-1 Plus, there are other issues: fairness , privacy , . . .

  37. Improving the current situation Let’s say. . . France (FR) wants to query a DB with criminal records held by Germany (DE). Both countries recognize the authority of a Judge (JU).

  38. Improving the current situation Let’s say. . . France (FR) wants to query a DB with criminal records held by Germany (DE). Both countries recognize the authority of a Judge (JU). Our goals: DE does not learn FR’s query Even if authorized by JU, FR does not learn more than the records that match JU does not learn the result of the query

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend