Lattices: From Worst-Case, to Average-Case, to Cryptography Chris Peikert
Georgia Institute of Technology Public Key Cryptography and the Geometry of Numbers 6 May 2010
1 / 16
Lattices: From Worst-Case, to Average-Case, to Cryptography Chris - - PowerPoint PPT Presentation
Lattices: From Worst-Case, to Average-Case, to Cryptography Chris Peikert Georgia Institute of Technology Public Key Cryptography and the Geometry of Numbers 6 May 2010 1 / 16 Talk Agenda 1 Smoothing and discrete Gaussians 2 From worst-case
1 / 16
1 Smoothing and discrete Gaussians 2 From worst-case to average-case 3 Basic crypto applications
2 / 16
3 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
5 / 16
O
5 / 16
O
5 / 16
O
5 / 16
5 / 16
b2
6 / 16
b2
6 / 16
i , bj = δij. (GSO in reverse.)
b2
b∗
1
2 = b∗ 2
1
6 / 16
i , bj = δij. (GSO in reverse.)
i = 1/
b2
b∗
1
2 = b∗ 2
1
6 / 16
7 / 16
1 x belongs to uniform∗ coset L + c
7 / 16
1 x belongs to uniform∗ coset L + c
2 Given c, conditional distrib of x ∈ L + c is:
7 / 16
1 x belongs to uniform∗ coset L + c
2 Given c, conditional distrib of x ∈ L + c is:
1 High probability tail bounds: for x ∼ DL+c,s,
7 / 16
1 x belongs to uniform∗ coset L + c
2 Given c, conditional distrib of x ∈ L + c is:
1 High probability tail bounds: for x ∼ DL+c,s,
2 Additive: if x ∼ DL+c,s and y ∼ DL+d,t, then x + y ∼ DL+c+d,√ s2+t2
7 / 16
1 x belongs to uniform∗ coset L + c
2 Given c, conditional distrib of x ∈ L + c is:
1 High probability tail bounds: for x ∼ DL+c,s,
2 Additive: if x ∼ DL+c,s and y ∼ DL+d,t, then x + y ∼ DL+c+d,√ s2+t2 3 Unpredictable: min-entropy ≥ n
7 / 16
1 x belongs to uniform∗ coset L + c
2 Given c, conditional distrib of x ∈ L + c is:
1 High probability tail bounds: for x ∼ DL+c,s,
2 Additive: if x ∼ DL+c,s and y ∼ DL+d,t, then x + y ∼ DL+c+d,√ s2+t2 3 Unpredictable: min-entropy ≥ n 4 Many more . . .
7 / 16
⋆ Output distribution is ‘oblivious’ to input basis B 8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2 8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2 8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2 8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2 8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2
8 / 16
⋆ Output distribution is ‘oblivious’ to input basis B
c b1 b2
8 / 16
9 / 16
q
q
10 / 16
q
q
10 / 16
q
q
10 / 16
q
q
10 / 16
q
q
O (0, q) (q, 0) 10 / 16
q
q
O (0, q) (q, 0) 10 / 16
q
q
O (0, q) (q, 0) x 10 / 16
q as
11 / 16
q as
11 / 16
q as
11 / 16
q as
11 / 16
q as
x 11 / 16
q as
x 11 / 16
q as
x 11 / 16
12 / 16
12 / 16
1 Sample A: for i = 1 to m:
⋆ Draw yi ∼ DL,s using sampling algorithm
⋆ Map yi ∈ L/qL
q
12 / 16
1 Sample A: for i = 1 to m:
⋆ Draw yi ∼ DL,s using sampling algorithm ⋆ Map yi ∈ L/qL
q
2 Solve SIS on A: get nonzero z ∈ Zm s.t. Az = 0 ∈ Zn q and z ≤ β.
12 / 16
1 Sample A: for i = 1 to m:
⋆ Draw yi ∼ DL,s using sampling algorithm ⋆ Map yi ∈ L/qL
q
2 Solve SIS on A: get nonzero z ∈ Zm s.t. Az = 0 ∈ Zn q and z ≤ β. 3 Combine yi’s: let x = Yz ∈ qL. Also, x = 0 and x ≤ sβ√n
12 / 16
1 Sample A: for i = 1 to m:
⋆ Draw yi ∼ DL,s using sampling algorithm ⋆ Map yi ∈ L/qL
q
2 Solve SIS on A: get nonzero z ∈ Zm s.t. Az = 0 ∈ Zn q and z ≤ β. 3 Combine yi’s: let x = Yz ∈ qL. Also, x = 0 and x ≤ sβ√n
12 / 16
1 Sample A: for i = 1 to m:
⋆ Draw yi ∼ DL,s using sampling algorithm ⋆ Map yi ∈ L/qL
q
2 Solve SIS on A: get nonzero z ∈ Zm s.t. Az = 0 ∈ Zn q and z ≤ β. 3 Combine yi’s: let x = Yz ∈ qL. Also, x = 0 and x ≤ sβ√n
12 / 16
13 / 16
q, given ‘noisy random inner products’
13 / 16
q, given ‘noisy random inner products’
13 / 16
q, given ‘noisy random inner products’
13 / 16
q, given ‘noisy random inner products’
13 / 16
q, given ‘noisy random inner products’
⋆ GapSVP & SIVP under quantum reduction.
⋆ GapSVP & variants under classical reduction.
13 / 16
q
(Images courtesy xkcd.org) 14 / 16
q
(public key) (Images courtesy xkcd.org) 14 / 16
q
(public key)
(ciphertext ‘preamble’) (Images courtesy xkcd.org) 14 / 16
q
(public key)
(ciphertext ‘preamble’)
2⌋
(key / ‘pad’) (Images courtesy xkcd.org) 14 / 16
q
(public key)
(ciphertext ‘preamble’)
2⌋
(key / ‘pad’) (Images courtesy xkcd.org) 14 / 16
q
(public key)
(ciphertext ‘preamble’)
2⌋
(key / ‘pad’)
(Images courtesy xkcd.org) 14 / 16
q
(public key)
(ciphertext ‘preamble’)
2⌋
(key / ‘pad’)
(Images courtesy xkcd.org) 14 / 16
15 / 16
(public key) 15 / 16
(public key)
(‘preamble’)
i
i + biti · ⌊ q 2⌋}
i = ui, s + e′ i
(‘pad’) 15 / 16
(public key)
(‘preamble’)
i
i + biti · ⌊ q 2⌋}
i = ui, s + e′ i
(‘pad’)
15 / 16
1 Discrete Gaussians on lattices are central objects in complexity
16 / 16
1 Discrete Gaussians on lattices are central objects in complexity
2 SIS and LWE are the central hard cryptographic problems.
⋆ They can be interpreted as both combinatorial and
16 / 16
1 Discrete Gaussians on lattices are central objects in complexity
2 SIS and LWE are the central hard cryptographic problems.
⋆ They can be interpreted as both combinatorial and
16 / 16