Lattice-Based Cryptography Chris Peikert
University of Michigan QCrypt 2016
1 / 24
Lattice-Based Cryptography Chris Peikert University of Michigan - - PowerPoint PPT Presentation
Lattice-Based Cryptography Chris Peikert University of Michigan QCrypt 2016 1 / 24 Agenda 1 Foundations: lattice problems, SIS/LWE and their applications 2 Ring-Based Crypto: NTRU, Ring-SIS/LWE and ideal lattices 3 Practical Implementations:
1 / 24
1 Foundations: lattice problems, SIS/LWE and their applications 2 Ring-Based Crypto: NTRU, Ring-SIS/LWE and ideal lattices 3 Practical Implementations: BLISS, NewHope, Frodo, HElib, Λ◦λ, . . . 4 Along the Way: open questions, research directions
2 / 24
3 / 24
(Images courtesy xkcd.org) 4 / 24
(Images courtesy xkcd.org) 4 / 24
(Images courtesy xkcd.org)
4 / 24
(Images courtesy xkcd.org)
4 / 24
(Images courtesy xkcd.org)
4 / 24
(Images courtesy xkcd.org)
4 / 24
O 5 / 24
m
O b1 b2 5 / 24
m
O b1 b2 5 / 24
m
O b1 b2 5 / 24
m
O b1 b2
5 / 24
q = n-dimensional integer vectors modulo q
6 / 24
q = n-dimensional integer vectors modulo q
q
6 / 24
q = n-dimensional integer vectors modulo q
q
6 / 24
q = n-dimensional integer vectors modulo q
q
6 / 24
q = n-dimensional integer vectors modulo q
q
q
6 / 24
q = n-dimensional integer vectors modulo q
q
q
6 / 24
q = n-dimensional integer vectors modulo q
q
q
6 / 24
7 / 24
q
O 7 / 24
q
O (0, q) (q, 0) 7 / 24
q
O (0, q) (q, 0) 7 / 24
q
O (0, q) (q, 0)
q
7 / 24
8 / 24
q .
8 / 24
q .
8 / 24
q .
8 / 24
q .
8 / 24
9 / 24
q given many ‘noisy inner products’
q
q
9 / 24
q given many ‘noisy inner products’
q
q
9 / 24
q given many ‘noisy inner products’
9 / 24
q given many ‘noisy inner products’
9 / 24
q given many ‘noisy inner products’
(quantum [R’05])
[BFKL’93,R’05,. . . ]
9 / 24
q given many ‘noisy inner products’
(quantum [R’05])
[BFKL’93,R’05,. . . ]
9 / 24
10 / 24
10 / 24
10 / 24
10 / 24
q
11 / 24
q
q
11 / 24
q
q
q
11 / 24
q
q
q
11 / 24
q
q
q
11 / 24
q
q
q
11 / 24
q
q
q
11 / 24
12 / 24
13 / 24
13 / 24
13 / 24
13 / 24
q
q
q .
14 / 24
q
q
q .
14 / 24
q
q
q .
14 / 24
q
q
q .
14 / 24
q
q
q .
14 / 24
15 / 24
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms 15 / 24
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms
15 / 24
⋆ Elements of Rq are deg < n polynomials with mod-q coefficients ⋆ Operations in Rq are very efficient using FFT-like algorithms
15 / 24
(quantum, any R = OK)
(classical, any cyclotomic R)
16 / 24
(quantum, any R = OK)
(classical, any cyclotomic R)
1 If you can find s given (ai , bi), then you can find approximately
16 / 24
(quantum, any R = OK)
(classical, any cyclotomic R)
1 If you can find s given (ai , bi), then you can find approximately
2 If you can distinguish (ai , bi) from (ai , bi), then you can find s.
16 / 24
(quantum, any R = OK)
(classical, any cyclotomic R)
1 If you can find s given (ai , bi), then you can find approximately
2 If you can distinguish (ai , bi) from (ai , bi), then you can find s.
16 / 24
(quantum, any R = OK)
(classical, any cyclotomic R)
1 If you can find s given (ai , bi), then you can find approximately
2 If you can distinguish (ai , bi) from (ai , bi), then you can find s.
⋆ If you can break the crypto, then you can distinguish (ai , bi) from
16 / 24
17 / 24
17 / 24
1 Obvious answer: ‘coefficient embedding’
17 / 24
1 Obvious answer: ‘coefficient embedding’
17 / 24
1 Obvious answer: ‘coefficient embedding’
2 Minkowski: ‘canonical embedding.’ Let ω = exp(πi/n) ∈ C, so roots
17 / 24
1 Obvious answer: ‘coefficient embedding’
2 Minkowski: ‘canonical embedding.’ Let ω = exp(πi/n) ∈ C, so roots
17 / 24
1 Obvious answer: ‘coefficient embedding’
2 Minkowski: ‘canonical embedding.’ Let ω = exp(πi/n) ∈ C, so roots
17 / 24
18 / 24
18 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
19 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
19 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
2 How hard/easy is poly(n)-R-SVP? (In cyclotomics etc.)
19 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
2 How hard/easy is poly(n)-R-SVP? (In cyclotomics etc.)
⋆ Despite much ring structure (e.g., subfields, Galois), no significant
19 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
2 How hard/easy is poly(n)-R-SVP? (In cyclotomics etc.)
⋆ Despite much ring structure (e.g., subfields, Galois), no significant
⋆ But 2O(√n log n)-SVP is quantum poly-time solvable in prime-power
19 / 24
1 We know approx-R-SVP ≤ R-LWE (quantumly). Other direction?
2 How hard/easy is poly(n)-R-SVP? (In cyclotomics etc.)
⋆ Despite much ring structure (e.g., subfields, Galois), no significant
⋆ But 2O(√n log n)-SVP is quantum poly-time solvable in prime-power
⋆ There is a 2Ω(√n/ log n) barrier for the main technique. Can it be
19 / 24
20 / 24
21 / 24
21 / 24
21 / 24
21 / 24
21 / 24
22 / 24
22 / 24
22 / 24
23 / 24
23 / 24
23 / 24
23 / 24
24 / 24
24 / 24
24 / 24
24 / 24