On Ideal Lattices and Learning With Errors Over Rings Vadim - - PowerPoint PPT Presentation

on ideal lattices and learning with errors over rings
SMART_READER_LITE
LIVE PREVIEW

On Ideal Lattices and Learning With Errors Over Rings Vadim - - PowerPoint PPT Presentation

On Ideal Lattices and Learning With Errors Over Rings Vadim Lyubashevsky 1 Chris Peikert 2 Oded Regev 1 1 Tel Aviv University 2 Georgia Institute of Technology Eurocrypt 2010 1 / 12 The Learning With Errors Problem [Regev05]


slide-1
SLIDE 1

On Ideal Lattices and Learning With Errors Over Rings

Vadim Lyubashevsky1 Chris Peikert 2 Oded Regev1

1Tel Aviv University 2Georgia Institute of Technology

Eurocrypt 2010

1 / 12

slide-2
SLIDE 2

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n).

2 / 12

slide-3
SLIDE 3

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

a1 ← Zn

q

, b1 ≈ a1 , s mod q a2 ← Zn

q

, b2 ≈ a2 , s mod q . . .

2 / 12

slide-4
SLIDE 4

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

a1 ← Zn

q

, b1 = a1 , s + e1 ∈ Zq a2 ← Zn

q

, b2 = a2 , s + e2 ∈ Zq . . .

√n ≤ error ≪ q

2 / 12

slide-5
SLIDE 5

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

    . . . At . . .     ,     . . . b . . .     = Ats + e

√n ≤ error ≪ q

2 / 12

slide-6
SLIDE 6

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

    . . . At . . .     ,     . . . b . . .     = Ats + e

√n ≤ error ≪ q

(After enough uniform ai’s, secret s is uniquely determined w/hp.)

2 / 12

slide-7
SLIDE 7

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

    . . . At . . .     ,     . . . b . . .     = Ats + e

√n ≤ error ≪ q

(After enough uniform ai’s, secret s is uniquely determined w/hp.)

◮ Decision: distinguish (A , b) from uniform (A , b)

2 / 12

slide-8
SLIDE 8

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

    . . . At . . .     ,     . . . b . . .     = Ats + e

√n ≤ error ≪ q

(After enough uniform ai’s, secret s is uniquely determined w/hp.)

◮ Decision: distinguish (A , b) from uniform (A , b) LWE is Hard (. . . maybe even for quantum!) worst case lattice problems ≤

(quantum [R’05])

search-LWE ≤

[BFKL ’93,R’05]

decision-LWE ≤ crypto

2 / 12

slide-9
SLIDE 9

The ‘Learning With Errors’ Problem

[Regev’05]

◮ Parameters: dimension n, prime modulus q = poly(n). ◮ Search: find secret s ∈ Zn

q given many ‘noisy inner products’

    . . . At . . .     ,     . . . b . . .     = Ats + e

√n ≤ error ≪ q

(After enough uniform ai’s, secret s is uniquely determined w/hp.)

◮ Decision: distinguish (A , b) from uniform (A , b) LWE is Hard (. . . maybe even for quantum!) worst case lattice problems ≤

(quantum [R’05])

search-LWE ≤

[BFKL ’93,R’05]

decision-LWE ≤ crypto ◮ (Also some classical hardness for search-LWE [P’09])

2 / 12

slide-10
SLIDE 10

LWE is Versatile

What kinds of crypto can we do with LWE?

3 / 12

slide-11
SLIDE 11

LWE is Versatile

What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09]

3 / 12

slide-12
SLIDE 12

LWE is Versatile

What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09] ◮ Identity-Based Encryption (in RO model) [GPV’08] Hierarchical ID-Based Encryption (w/o RO) [CHKP’10,ABB’10]

3 / 12

slide-13
SLIDE 13

LWE is Versatile

What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09] ◮ Identity-Based Encryption (in RO model) [GPV’08] Hierarchical ID-Based Encryption (w/o RO) [CHKP’10,ABB’10] UC Oblivious Transfer [PVW’08] Leakage Resilience [AGV’09,DGKPV’10,GKPV’10,ADNSWW’10,. . . ] Circular/KDM-Secure Encryption [ACPS’09,BHHI’10] Quadratic-Formula Homomorphic Encryption [GHV’10] Bi-Deniable Encryption [OP’10] and more. . .

3 / 12

slide-14
SLIDE 14

LWE is Efficient (. . . sort of)

  • a

 | s |   + e = b ∈ Zq ◮ Getting one extra pseudorandom scalar requires an n-dim inner product

4 / 12

slide-15
SLIDE 15

LWE is Efficient (. . . sort of)

  • a

 | s |   + e = b ∈ Zq ◮ Getting one extra pseudorandom scalar requires an n-dim inner product ◮ Can amortize each a over many secrets si, but still ˜ O(n) work per scalar output.

4 / 12

slide-16
SLIDE 16

LWE is Efficient (. . . sort of)

  • a

 | s |   + e = b ∈ Zq ◮ Getting one extra pseudorandom scalar requires an n-dim inner product ◮ Can amortize each a over many secrets si, but still ˜ O(n) work per scalar output. ◮ Public key crypto schemes have rather large keys: pk =     . . . At . . .    

  • n

,     . . . b . . .            Ω(n)

4 / 12

slide-17
SLIDE 17

LWE is Efficient (. . . sort of)

  • a

 | s |   + e = b ∈ Zq ◮ Getting one extra pseudorandom scalar requires an n-dim inner product ◮ Can amortize each a over many secrets si, but still ˜ O(n) work per scalar output. ◮ Public key crypto schemes have rather large keys: pk =     . . . At . . .    

  • n

,     . . . b . . .            Ω(n) ◮ Can fix A for all users, but at best, still ˜ Ω(n2) work to encrypt & decrypt an n-bit message

4 / 12

slide-18
SLIDE 18

Wishful Thinking. . .

  | a |   ⋆   | s |   +   | e |   =   | b |   ∈ Zn

q

◮ Get n pseudorandom scalars from just one (cheap) product operation?

5 / 12

slide-19
SLIDE 19

Wishful Thinking. . .

  | a |   ⋆   | s |   +   | e |   =   | b |   ∈ Zn

q

◮ Get n pseudorandom scalars from just one (cheap) product operation? Question ◮ How to define the product ‘⋆’ so that distribution is pseudorandom?

5 / 12

slide-20
SLIDE 20

Wishful Thinking. . .

  | a |   ⋆   | s |   +   | e |   =   | b |   ∈ Zn

q

◮ Get n pseudorandom scalars from just one (cheap) product operation? Question ◮ How to define the product ‘⋆’ so that distribution is pseudorandom?

⋆ Careful: w/ small error, coordinate-wise multiplication is not secure! 5 / 12

slide-21
SLIDE 21

Wishful Thinking. . .

  | a |   ⋆   | s |   +   | e |   =   | b |   ∈ Zn

q

◮ Get n pseudorandom scalars from just one (cheap) product operation? Question ◮ How to define the product ‘⋆’ so that distribution is pseudorandom?

⋆ Careful: w/ small error, coordinate-wise multiplication is not secure!

Answer ◮ ‘⋆’ = Multiplication in a polynomial ring: e.g., Zq[x]/(xn + 1). Very fast and practical with FFT / NTT: n log n operations mod q.

5 / 12

slide-22
SLIDE 22

Wishful Thinking. . .

  | a |   ⋆   | s |   +   | e |   =   | b |   ∈ Zn

q

◮ Get n pseudorandom scalars from just one (cheap) product operation? Question ◮ How to define the product ‘⋆’ so that distribution is pseudorandom?

⋆ Careful: w/ small error, coordinate-wise multiplication is not secure!

Answer ◮ ‘⋆’ = Multiplication in a polynomial ring: e.g., Zq[x]/(xn + 1). Very fast and practical with FFT / NTT: n log n operations mod q. ◮ Similar ring structures appear in heuristic NTRU scheme [HPS’98], in compact one-way / CR hash functions [Mic’02,PR’06,LM’06,. . . ], and in fully homomorphic encryption [Gen’09].

5 / 12

slide-23
SLIDE 23

Our Results

0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE

6 / 12

slide-24
SLIDE 24

Our Results

0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems:

worst case on ideal lattices ≤

(quantum, any ring of ints)

search Ring-LWE ≤

(classical, any cyclotomic ring)

decision Ring-LWE

6 / 12

slide-25
SLIDE 25

Our Results

0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems:

worst case on ideal lattices ≤

(quantum, any ring of ints)

search Ring-LWE ≤

(classical, any cyclotomic ring)

decision Ring-LWE

⋆ Concurrently & using different techniques, [SSTX’09] proved a

qualitatively weaker version of our first (quantum) reduction.

(Specifically: hardness for bounded # of samples in a specific ring.)

6 / 12

slide-26
SLIDE 26

Our Results

0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems:

worst case on ideal lattices ≤

(quantum, any ring of ints)

search Ring-LWE ≤

(classical, any cyclotomic ring)

decision Ring-LWE

⋆ Concurrently & using different techniques, [SSTX’09] proved a

qualitatively weaker version of our first (quantum) reduction.

(Specifically: hardness for bounded # of samples in a specific ring.)

⋆ Pseudorandomness is new, and important for crypto & efficiency.

Proof requires very different techniques than for standard LWE.

6 / 12

slide-27
SLIDE 27

Our Results

0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems:

worst case on ideal lattices ≤

(quantum, any ring of ints)

search Ring-LWE ≤

(classical, any cyclotomic ring)

decision Ring-LWE

⋆ Concurrently & using different techniques, [SSTX’09] proved a

qualitatively weaker version of our first (quantum) reduction.

(Specifically: hardness for bounded # of samples in a specific ring.)

⋆ Pseudorandomness is new, and important for crypto & efficiency.

Proof requires very different techniques than for standard LWE.

2 A ‘cookbook’ for porting LWE-based schemes to Ring-LWE, plus

an entirely new & even more efficient PKE scheme.

6 / 12

slide-28
SLIDE 28

LWE Over a Ring

◮ Example: ring Rq = Zq[x]/(xn + 1) for n = 2k and q = 1 mod 2n.

7 / 12

slide-29
SLIDE 29

LWE Over a Ring

◮ Example: ring Rq = Zq[x]/(xn + 1) for n = 2k and q = 1 mod 2n.

⋆ Elements may be viewed as dim < n polynomials with Zq coeffs. . . ⋆ . . . or as vectors in Zn

q.

7 / 12

slide-30
SLIDE 30

LWE Over a Ring

◮ Example: ring Rq = Zq[x]/(xn + 1) for n = 2k and q = 1 mod 2n.

⋆ Elements may be viewed as dim < n polynomials with Zq coeffs. . . ⋆ . . . or as vectors in Zn

q.

polynomial ‘+’ ← → vector addition polynomial ‘×’ ← → ‘anti-cyclic convolution’

7 / 12

slide-31
SLIDE 31

LWE Over a Ring

◮ Example: ring Rq = Zq[x]/(xn + 1) for n = 2k and q = 1 mod 2n.

⋆ Elements may be viewed as dim < n polynomials with Zq coeffs. . . ⋆ . . . or as vectors in Zn

q.

polynomial ‘+’ ← → vector addition polynomial ‘×’ ← → ‘anti-cyclic convolution’ ◮ Search: find the secret s ∈ Rq, given: a1 ← Rq , b1 = a1 × s + e1 ∈ Rq a2 ← Rq , b2 = a2 × s + e2 ∈ Rq . . . Error vectors

7 / 12

slide-32
SLIDE 32

LWE Over a Ring

◮ Example: ring Rq = Zq[x]/(xn + 1) for n = 2k and q = 1 mod 2n.

⋆ Elements may be viewed as dim < n polynomials with Zq coeffs. . . ⋆ . . . or as vectors in Zn

q.

polynomial ‘+’ ← → vector addition polynomial ‘×’ ← → ‘anti-cyclic convolution’ ◮ Search: find the secret s ∈ Rq, given: a1 ← Rq , b1 = a1 × s + e1 ∈ Rq a2 ← Rq , b2 = a2 × s + e2 ∈ Rq . . . Error vectors ◮ Decision: distinguish (ai , bi) from uniform (ai , bi).

7 / 12

slide-33
SLIDE 33

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e)

8 / 12

slide-34
SLIDE 34

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e) ◮ Encrypt m ∈ {0, 1}n: choose ‘short’ t ∈ Rq. Output ciphertext (c1, c2) = (a × t + e1 , b × t + e2 + m · [ q

2])

≈ (a × t , a × s × t + m · [ q

2])

8 / 12

slide-35
SLIDE 35

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e) ◮ Encrypt m ∈ {0, 1}n: choose ‘short’ t ∈ Rq. Output ciphertext (c1, c2) = (a × t + e1 , b × t + e2 + m · [ q

2])

≈ (a × t , a × s × t + m · [ q

2])

◮ Decrypt: recover m from c2 − c1 × s.

8 / 12

slide-36
SLIDE 36

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e) ◮ Encrypt m ∈ {0, 1}n: choose ‘short’ t ∈ Rq. Output ciphertext (c1, c2) = (a × t + e1 , b × t + e2 + m · [ q

2])

≈ (a × t , a × s × t + m · [ q

2])

◮ Decrypt: recover m from c2 − c1 × s. ◮ Works just like subset-sum encryption [LPS’10] and . . . ElGamal ?!?

8 / 12

slide-37
SLIDE 37

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e) ◮ Encrypt m ∈ {0, 1}n: choose ‘short’ t ∈ Rq. Output ciphertext (c1, c2) = (a × t + e1 , b × t + e2 + m · [ q

2])

≈ (a × t , a × s × t + m · [ q

2])

◮ Decrypt: recover m from c2 − c1 × s. ◮ Works just like subset-sum encryption [LPS’10] and . . . ElGamal ?!? But only ˜ O(n) key size, Enc, Dec for n-bit message.

8 / 12

slide-38
SLIDE 38

A New Kind of LWE Cryptosystem

◮ Secret key: ‘short’ s ∈ Rq. Public key: (a , b = a × s + e) ◮ Encrypt m ∈ {0, 1}n: choose ‘short’ t ∈ Rq. Output ciphertext (c1, c2) = (a × t + e1 , b × t + e2 + m · [ q

2])

≈ (a × t , a × s × t + m · [ q

2])

◮ Decrypt: recover m from c2 − c1 × s. ◮ Works just like subset-sum encryption [LPS’10] and . . . ElGamal ?!? But only ˜ O(n) key size, Enc, Dec for n-bit message. Proof of CPA Security

1 Public key (a, b) ≈c (a, b) by decision Ring-LWE

(even for ‘short’ s [ACPS’09])

2 Ciphertext (c1, c2) ≈c (c1, c2), again by decision Ring-LWE

8 / 12

slide-39
SLIDE 39

Hardness of Search Ring-LWE

Theorem 1 For any large enough q, solving search Ring-LWE is as hard as quantumly solving poly(n)-approx SVP in any (worst-case) ideal lattice from the ring.

9 / 12

slide-40
SLIDE 40

Hardness of Search Ring-LWE

Theorem 1 For any large enough q, solving search Ring-LWE is as hard as quantumly solving poly(n)-approx SVP in any (worst-case) ideal lattice from the ring. ◮ Proof follows the outline of [Regev’05] for LWE & arbitrary lattices. Quantum component used as ‘black-box;’ only classical part needs adaptation to the ring setting.

9 / 12

slide-41
SLIDE 41

Hardness of Search Ring-LWE

Theorem 1 For any large enough q, solving search Ring-LWE is as hard as quantumly solving poly(n)-approx SVP in any (worst-case) ideal lattice from the ring. ◮ Proof follows the outline of [Regev’05] for LWE & arbitrary lattices. Quantum component used as ‘black-box;’ only classical part needs adaptation to the ring setting. ◮ New reduction technique for ‘clearing the ideal’ (I/qI → R/qR), in an ‘algebra-preserving’ way. Uses Chinese remainder theorem and theory of duality for ideals.

9 / 12

slide-42
SLIDE 42

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R.

10 / 12

slide-43
SLIDE 43

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Rn. How?

10 / 12

slide-44
SLIDE 44

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Rn. How? ◮ [HPS’98,M’02,PR’06,LM’06,G’09,. . . ]: ‘coefficient embedding’ a(x) = a0 + a1x + · · · + an−1xn−1 → (a0, . . . , an−1) ∈ Zn

10 / 12

slide-45
SLIDE 45

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Rn. How? ◮ [HPS’98,M’02,PR’06,LM’06,G’09,. . . ]: ‘coefficient embedding’ a(x) = a0 + a1x + · · · + an−1xn−1 → (a0, . . . , an−1) ∈ Zn + is coordinate-wise, but analyzing × is cumbersome (esp. for rv’s)

10 / 12

slide-46
SLIDE 46

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Cn. How? ◮ [HPS’98,M’02,PR’06,LM’06,G’09,. . . ]: ‘coefficient embedding’ a(x) = a0 + a1x + · · · + an−1xn−1 → (a0, . . . , an−1) ∈ Zn + is coordinate-wise, but analyzing × is cumbersome (esp. for rv’s) ◮ [Minkowski’18??,. . . ]: ‘canonical embedding.’ Let ω = exp(πi/n): a(x) → (a(ω1) , a(ω3) , . . . , a(ω2n−1)) ∈ Cn

10 / 12

slide-47
SLIDE 47

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Cn. How? ◮ [HPS’98,M’02,PR’06,LM’06,G’09,. . . ]: ‘coefficient embedding’ a(x) = a0 + a1x + · · · + an−1xn−1 → (a0, . . . , an−1) ∈ Zn + is coordinate-wise, but analyzing × is cumbersome (esp. for rv’s) ◮ [Minkowski’18??,. . . ]: ‘canonical embedding.’ Let ω = exp(πi/n): a(x) → (a(ω1) , a(ω3) , . . . , a(ω2n−1)) ∈ Cn Both + and × are coordinate-wise! Nice geometric behavior.

10 / 12

slide-48
SLIDE 48

A Word on Ideal Lattices

◮ Recall example ring R = Z[x]/(xn + 1) for n = 2k. ◮ An ideal I ⊆ R is closed under + and −, and under × with R. To get ideal lattices, embed R and its ideals into Zn

  • q. How?

◮ [HPS’98,M’02,PR’06,LM’06,G’09,. . . ]: ‘coefficient embedding’ a(x) = a0 + a1x + · · · + an−1xn−1 → (a0, . . . , an−1) ∈ Zn + is coordinate-wise, but analyzing × is cumbersome (esp. for rv’s) ◮ [Minkowski’18??,. . . ]: ‘canonical embedding.’ Let ω = exp(πi/n): a(x) → (a(ω1) , a(ω3) , . . . , a(ω2n−1)) ∈ Cn Both + and × are coordinate-wise! Nice geometric behavior. ◮ Modulo any prime q = 1 mod 2n, (xn + 1) has n roots ω2i−1 ∈ Zq. For Ring-LWE schemes, this gives an embedding into Zn

q.

10 / 12

slide-49
SLIDE 49

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE.

11 / 12

slide-50
SLIDE 50

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

11 / 12

slide-51
SLIDE 51

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

1 Hybrid argument: randomize b(ω1) ∈ Zq, then (b(ω1), b(ω3)), . . .

Then O must distinguish relative to some ω2i−1.

11 / 12

slide-52
SLIDE 52

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

1 Hybrid argument: randomize b(ω1) ∈ Zq, then (b(ω1), b(ω3)), . . .

Then O must distinguish relative to some ω2i−1.

2 Using O, guess-and-check to find s(ω2i−1) ∈ Zq

(a la [BFKL ’93,R’05]).

11 / 12

slide-53
SLIDE 53

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

1 Hybrid argument: randomize b(ω1) ∈ Zq, then (b(ω1), b(ω3)), . . .

Then O must distinguish relative to some ω2i−1.

2 Using O, guess-and-check to find s(ω2i−1) ∈ Zq

(a la [BFKL ’93,R’05]).

3 How to find other s(ω2j−1)? Couldn’t O be useless on other roots?

11 / 12

slide-54
SLIDE 54

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

1 Hybrid argument: randomize b(ω1) ∈ Zq, then (b(ω1), b(ω3)), . . .

Then O must distinguish relative to some ω2i−1.

2 Using O, guess-and-check to find s(ω2i−1) ∈ Zq

(a la [BFKL ’93,R’05]).

3 How to find other s(ω2j−1)? Couldn’t O be useless on other roots?

Map ω → ωk permutes roots of xn + 1. Can send each to ω2i−1.

11 / 12

slide-55
SLIDE 55

Pseudorandomness of Ring-LWE

Theorem 2 Solving decision Ring-LWE in Rq = Zq[x]/(xn + 1)

(for any poly(n)-bounded prime q = 1 mod 2n)

is as hard as solving search Ring-LWE. Proof Outline Given: O distinguishes samples (a, b ≈ a × s) from uniform (a, b). Goal: Find s ∈ Rq. Equivalent to finding s(ω2j−1) ∈ Zq for j = 1, . . . , n.

1 Hybrid argument: randomize b(ω1) ∈ Zq, then (b(ω1), b(ω3)), . . .

Then O must distinguish relative to some ω2i−1.

2 Using O, guess-and-check to find s(ω2i−1) ∈ Zq

(a la [BFKL ’93,R’05]).

3 How to find other s(ω2j−1)? Couldn’t O be useless on other roots?

Map ω → ωk permutes roots of xn + 1. Can send each to ω2i−1.

(Math jargon: use the automorphism (Galois) group of the cyclotomic number field.)

11 / 12

slide-56
SLIDE 56

Summary and Conclusions

◮ In any cyclotomic ring, Ring-LWE is pseudorandom if ideal lattice problems are (quantumly) hard in the worst case.

12 / 12

slide-57
SLIDE 57

Summary and Conclusions

◮ In any cyclotomic ring, Ring-LWE is pseudorandom if ideal lattice problems are (quantumly) hard in the worst case. ◮ Ring-LWE allows for much more compact and efficient encryption schemes than standard LWE. E.g., PKE in ˜ O(1) work per message bit.

12 / 12

slide-58
SLIDE 58

Summary and Conclusions

◮ In any cyclotomic ring, Ring-LWE is pseudorandom if ideal lattice problems are (quantumly) hard in the worst case. ◮ Ring-LWE allows for much more compact and efficient encryption schemes than standard LWE. E.g., PKE in ˜ O(1) work per message bit. ◮ Main open direction: develop new kinds of constructions unlike those based on standard LWE (e.g., fully homomorphic PKE?)

12 / 12

slide-59
SLIDE 59

Summary and Conclusions

◮ In any cyclotomic ring, Ring-LWE is pseudorandom if ideal lattice problems are (quantumly) hard in the worst case. ◮ Ring-LWE allows for much more compact and efficient encryption schemes than standard LWE. E.g., PKE in ˜ O(1) work per message bit. ◮ Main open direction: develop new kinds of constructions unlike those based on standard LWE (e.g., fully homomorphic PKE?) ◮ Questions? More details? Find me here:

12 / 12