Multilinear Maps over the Integers From Design to Security
Tancrède Lepoint CryptoExperts
The Mathematics of Modern Cryptography Workshop, July 10th 2015
Multilinear Maps over the Integers From Design to Security Tancrde - - PowerPoint PPT Presentation
Multilinear Maps over the Integers From Design to Security Tancrde Lepoint CryptoExperts The Mathematics of Modern Cryptography Workshop, July 10th 2015 Timeline: The Hype Cycle of Multilinear Maps 2 / 30 visibility Timeline time 2 / 30
The Mathematics of Modern Cryptography Workshop, July 10th 2015
2 / 30
2 / 30
2 / 30
2 / 30
2 / 30
2 / 30
2 / 30
2 / 30
3 / 30
3 / 30
3 / 30
4 / 30
4 / 30
4 / 30
◮ Level by multiplicative mask ◮ Zero-testing by multiplication and “shortness”
4 / 30
◮ Level by multiplicative mask ◮ Zero-testing by multiplication and “shortness”
4 / 30
◮ Level by multiplicative mask ◮ Zero-testing by multiplication and “shortness”
4 / 30
5 / 30
5 / 30
5 / 30
5 / 30
5 / 30
6 / 30
6 / 30
6 / 30
6 / 30
6 / 30
6 / 30
6 / 30
7 / 30
7 / 30
7 / 30
7 / 30
8 / 30
8 / 30
8 / 30
8 / 30
9 / 30
i −1/zk mod pi) · p∗ i + (
i = j=i pj
9 / 30
i −1/zk mod pi) · p∗ i + (
i = j=i pj
9 / 30
i −1/zk mod pi) · p∗ i + (
i = j=i pj
9 / 30
i
i mod x0
10 / 30
i
i mod x0
i
i mod x0
10 / 30
i
i mod x0
i
i mod x0
10 / 30
11 / 30
i=1
11 / 30
i=1
11 / 30
i=1
11 / 30
i=1
11 / 30
12 / 30
13 / 30
i ri · (hi · p∗ i ) ∈ Z
13 / 30
i ri · ˆ
i ) ∈ Z
13 / 30
i ri · ˆ
i ) ∈ Z
i )
13 / 30
i ri · ˆ
i ) ∈ Z
i )
13 / 30
14 / 30
i )
i · (hi · p∗ i )
14 / 30
i )
i · (hi · p∗ i )
i
14 / 30
i )
i · (hi · p∗ i )
i
i
14 / 30
i)/z
i
15 / 30
i)/z
i
i = ˆ
i
15 / 30
i)/z
i
i = ˆ
i
i · [
15 / 30
i)/z
i
i = ˆ
i
i · [
i · [
15 / 30
16 / 30
16 / 30
16 / 30
i )
16 / 30
17 / 30
17 / 30
17 / 30
17 / 30
◮ the zero-testing is done modulo a new prime modulus N; ◮ x0 is no longer public.
17 / 30
18 / 30
18 / 30
i
i −1z−k mod pi)p∗ i .
18 / 30
i
i −1z−k mod pi)p∗ i .
18 / 30
19 / 30
i
19 / 30
i
19 / 30
20 / 30
20 / 30
20 / 30
21 / 30
i −1zk mod pi)p∗ i
21 / 30
i −1zk mod pi)p∗ i
j
21 / 30
i −1zk mod pi)p∗ i
j
j
21 / 30
i −1zk mod pi)p∗ i
j
j
j
j
j
j
j
22 / 30
j
j
j
22 / 30
j
i
23 / 30
j
i
23 / 30
24 / 30
24 / 30
24 / 30
24 / 30
25 / 30
25 / 30
◮ encodings
i
◮ do the operation over Z, and remove X (j) i
25 / 30
26 / 30
26 / 30
i
26 / 30
i
26 / 30
i
26 / 30
27 / 30
28 / 30
28 / 30
28 / 30
◮ Analyze the reparation ◮ Improve the efficiency ◮ Adapt the technique to [GGH13]?
28 / 30
29 / 30
◮ public encoding space / inversion
◮ what sort of assumptions can be made? ◮ base multilinear maps on well-known problems
◮ something that look different from obfuscation ◮ what can you do with a small number of levels? ◮ relation between 2-multilinear maps / pairings in applications 30 / 30