Lattice-Based Cryptography: Short Integer Solution (SIS) and Learning With Errors (LWE) Chris Peikert
Georgia Institute of Technology crypt@b-it 2013
1 / 17
Lattice-Based Cryptography: Short Integer Solution (SIS) and - - PowerPoint PPT Presentation
Lattice-Based Cryptography: Short Integer Solution (SIS) and Learning With Errors (LWE) Chris Peikert Georgia Institute of Technology crypt@b-it 2013 1 / 17 Recall: Lattices Full-rank additive subgroup in Z m . O 2 / 17 Recall:
1 / 17
O 2 / 17
O b1 b2 2 / 17
O b1 b2 2 / 17
O b1 b2 2 / 17
O b1 b2
2 / 17
3 / 17
3 / 17
3 / 17
3 / 17
3 / 17
3 / 17
3 / 17
4 / 17
O 4 / 17
O (0, q) (q, 0) 4 / 17
O (0, q) (q, 0) 4 / 17
O (0, q) (q, 0) x 4 / 17
O (0, q) (q, 0)
q
4 / 17
5 / 17
m q
m for (say) ¯
5 / 17
m q
m for (say) ¯
x 1 ]. (We just reduced −¯
5 / 17
m q
m for (say) ¯
x 1 ]. (We just reduced −¯
5 / 17
m q
m for (say) ¯
x 1 ]. (We just reduced −¯
5 / 17
m q
m for (say) ¯
x 1 ]. (We just reduced −¯
5 / 17
m q
m for (say) ¯
x 1 ]. (We just reduced −¯
5 / 17
6 / 17
6 / 17
6 / 17
6 / 17
6 / 17
[R’05,PW’08,GPV’08,PVW’08,CDMW’08,AGV’09,ACPS’09,CHKP’10,ABB’10a,ABB’10b,GKV’10,BV’11,BGV’12,. . . ] 6 / 17
7 / 17
7 / 17
⋆ Required by worst-case hardness proofs ⋆ There’s an exp((αq)2)-time attack! [AG’11] 8 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
9 / 17
O (0, q) (q, 0)
10 / 17
11 / 17
11 / 17
11 / 17
11 / 17
11 / 17
11 / 17
11 / 17
12 / 17
12 / 17
12 / 17
12 / 17
12 / 17
⋆ If s1 = 0, then b = s, a′ + e ⇒ D accepts. 12 / 17
⋆ If s1 = 0, then b = s, a′ + e ⇒ D accepts. ⋆ If s1 = 0 and q prime then b = uniform ⇒ D rejects. 12 / 17
⋆ If s1 = 0, then b = s, a′ + e ⇒ D accepts. ⋆ If s1 = 0 and q prime then b = uniform ⇒ D rejects.
[P’09,ACPS’09,MM’11,MP’12,BGV’12] 12 / 17
13 / 17
13 / 17
13 / 17
13 / 17
13 / 17
13 / 17
13 / 17
13 / 17
(Images courtesy xkcd.org) 14 / 17
(public key) (Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’) (Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’) (Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’) (Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
(Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
(Images courtesy xkcd.org) 14 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
(Images courtesy xkcd.org) 14 / 17
15 / 17
(public key, uniform when m ≥ n log q) 15 / 17
(public key, uniform when m ≥ n log q)
(ciphertext ‘preamble’) 15 / 17
(public key, uniform when m ≥ n log q)
(ciphertext ‘preamble’)
(‘payload’) 15 / 17
(public key, uniform when m ≥ n log q)
(ciphertext ‘preamble’)
(‘payload’) 15 / 17
(public key, uniform when m ≥ n log q)
(ciphertext ‘preamble’)
(‘payload’)
15 / 17
(public key, uniform when m ≥ n log q)
(ciphertext ‘preamble’)
(‘payload’)
15 / 17
16 / 17
(public key) 16 / 17
(public key)
(ciphertext ‘preamble’) 16 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’) 16 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’) 16 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
16 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
16 / 17
(public key)
(ciphertext ‘preamble’)
(‘payload’)
16 / 17
17 / 17