on the ring lwe and polynomial lwe problems
play

On the Ring-LWE and Polynomial-LWE problems Miruna Roca, Damien - PowerPoint PPT Presentation

On the Ring-LWE and Polynomial-LWE problems Miruna Roca, Damien Stehl, Alexandre Wallet 1/35 A. Wallet About todays talk Its post-quantum (public-key) crypto time! Cryptography = building secure schemes Theoretical security = reduction


  1. On the Ring-LWE and Polynomial-LWE problems Miruna Roşca, Damien Stehlé, Alexandre Wallet 1/35 A. Wallet

  2. About today’s talk It’s post-quantum (public-key) crypto time! Cryptography = building secure schemes Theoretical security = reduction from hard † algorithmic problems Classical public-key crypto (RSA, DLog) broken by quantum computers. ⇒ We need quantum hard † problems . This talk is about: Lattice-based cryptography (a post-quantum assumption) Reductions between hard † problems related to lattices Theoretical stuff, but impacts the understanding of practical schemes † : at least conjecturally 2/35 A. Wallet

  3. About today’s talk It’s post-quantum (public-key) crypto time! Cryptography = building secure schemes Theoretical security = reduction from hard † algorithmic problems Classical public-key crypto (RSA, DLog) broken by quantum computers. ⇒ We need quantum hard † problems . This talk is about: Lattice-based cryptography (a post-quantum assumption) Reductions between hard † problems related to lattices Theoretical stuff, but impacts the understanding of practical schemes † : at least conjecturally 2/35 A. Wallet

  4. ApproxSVP ( O K -ideals) [PRS17] K = Q [ X ] /f O ∨ Decision RLWE ∨ Search RLWE ∨ K This work “Ring-based O K Decision RLWE Search RLWE LWE” Decision PLWE Z [ X ] /f Search PLWE 3/35 A. Wallet

  5. ApproxSVP ( O K -ideals) [PRS17] K = Q [ X ] /f O ∨ Decision RLWE ∨ Search RLWE ∨ K “Ring-based O K Decision RLWE Search RLWE LWE” Decision PLWE Z [ X ] /f Search PLWE 3/35 A. Wallet

  6. “On variants of Polynomial-LWE and Ring-LWE” (EUROCRYPT 2018) Results: (A) The 3 settings are essentially † the same (B) Search = Decision in all settings. Not described: Worst-case hardness for Polynomial-LWE. † : for a large number of “reasonable” polynomials, up to polynomial factors on noise, assuming some information about the field are known. 4/35 A. Wallet

  7. LWE and Cryptography 1 Regev’s encryption scheme Learning With Errors (LWE) and its hardness Ring-based LWE 2 Reductions between Ring-based LWE’s 3 Search to Decision 4 Open problems 5 5/35 A. Wallet

  8. An encryption scheme [Regev’05] n “security parameter”, q prime, n ≤ m ≤ poly ( n ) , D distribution over Z q = Z /q Z . 6/35 A. Wallet

  9. An encryption scheme [Regev’05] n “security parameter”, q prime, n ≤ m ≤ poly ( n ) , D distribution over Z q = Z /q Z . 6/35 A. Wallet

  10. An encryption scheme [Regev’05] n “security parameter”, q prime, n ≤ m ≤ poly ( n ) , D distribution over Z q = Z /q Z . Correctness: q, m, χ chosen s.t. e ′ = � e i ≤ q 4 whp. 0 if e ′ ∼ 0 � Dec s ( a ′ , b ′ ) = 1 if e ′ ∼ q 2 6/35 A. Wallet

  11. Learning With Errors [Regev’05] n ∈ N ∗ , q ≤ poly ( n ) a prime D → D σ discrete Gaussian distribution Z q := Z /q Z . LWE distribution: Fix s ∈ Z n q .  ֓ U ( Z n  a ← q )  A s ,σ,q : e ← ֓ D σ   outputs ( a , b = ( � a , s � + e ) mod q ) 7/35 A. Wallet

  12. LWE hardness and lattices [Regev’05] ApproxSVP γ : Given B , compute λ 1 up to a factor γ . For γ = poly ( n ) , best known algo runs in time 2 O ( n ) (classic, quantum ). solve Decision-LWE solve break quantum � classical � = ApproxSVP poly ( n ) Regev’s encryption solve Search-LWE Practical limitations of LWE: public data size, speed. A solution: use structured matrices/lattices. 8/35 A. Wallet

  13. LWE hardness and lattices [Regev’05] ApproxSVP γ : Given B , compute λ 1 up to a factor γ . For γ = poly ( n ) , best known algo runs in time 2 O ( n ) (classic, quantum ). solve Decision-LWE solve break quantum � classical � = ApproxSVP poly ( n ) Regev’s encryption solve Search-LWE Practical limitations of LWE: public data size, speed. A solution: use structured matrices/lattices. 8/35 A. Wallet

  14. LWE and Cryptography 1 Ring-based LWE 2 Polynomial-LWE: ideal lattices Ring-LWE: more algebraic number theory Reductions between Ring-based LWE’s 3 Search to Decision 4 Open problems 5 9/35 A. Wallet

  15. Polynomial-LWE (PLWE) [SSTX09] q to R q := Z q [ X ] /f . Good example: f = X n + 1 , with n = 2 d . Change Z n polynomials integer vectors/matrices s = � s i X i ∈ R q s = ( s 0 , . . . , s n − 1 ) ⊤ ∈ Z n q Produit: a · s mod f Mult. by a with structured matrix  a 0 − a 1 . . . − a n − 1  a 1 a 0 . . . − a n − 2   T f ( a ) =  . .  ... . .   . .   a n − 1 a n − 2 . . . a 0 10/35 A. Wallet

  16. 11/35 A. Wallet

  17. PLWE and its hardness [SSTX’09] R = Z [ X ] /f Σ : any pos.def.matrix f monic, irreducible, degree n . D Σ n -dimensional Gaussian . PLWE distribution: Fix s ∈ R q   a ← ֓ U ( R q )  PLWE q, Σ ,f,s : e ← ֓ D Σ   outputs ( a, b = ( a · s + e ) mod qR ) Solve Search-PLWE ⇒ solve ApproxSVP γ in ideal lattices for γ ≤ poly ( n ) . → T f ( a ) · Z n ideal lattice? Ex: aR = { multiples of a in R } �− 12/35 A. Wallet

  18. PLWE and its hardness [SSTX’09] R = Z [ X ] /f Σ : any pos.def.matrix f monic, irreducible, degree n . D Σ n -dimensional Gaussian . PLWE distribution: Fix s ∈ R q   a ← ֓ U ( R q )  PLWE q, Σ ,f,s : e ← ֓ D Σ   outputs ( a, b = ( a · s + e ) mod qR ) Solve Search-PLWE ⇒ solve ApproxSVP γ in ideal lattices for γ ≤ poly ( n ) . → T f ( a ) · Z n ideal lattice? Ex: aR = { multiples of a in R } �− 12/35 A. Wallet

  19. Practice vs. Theory Perks: New Hope ✓ fast and compact operations (NIST competitor) ✓ post-quantum scheme Public key: ∼ 2 KBytes Handshake: ∼ 0 . 3 ms Theoretical limitations: → Restricts “good f ’s” ✗ γ depends on f ’s “expansion factor” → Lack of generality/flexibility ✗ Working with R relies too much on f 13/35 A. Wallet

  20. Number fields and rings R = Z [ X ] /f is a number ring . Lives in K = Q [ X ] /f , a number field . Structure: K = Span Q (1 , X, . . . , X n − 1 ) where n = deg f Field embeddings: σ j ( a ) = � a i α ji ∈ C where f = � i ≤ n ( X − α j ) . f has s 1 real roots and 2 s 2 (conjugate) complex roots. Two representations Coefficient embedding “Canonical” embedding → a = ( a 0 , . . . , a n − 1 ) ⊤ ∈ Q n → σ ( a ) = ( σ 1 ( a ) , . . . , σ n ( a )) ⊤ ∈ H a �− a �− σ ( ab ) = ( σ i ( a ) σ i ( b )) i ≤ n H is a R -inner-product space of dimension n in C n “canonical norm” � = “coefficient norm” 14/35 A. Wallet

  21. Number fields and rings R = Z [ X ] /f is a number ring . Lives in K = Q [ X ] /f , a number field . Structure: K = Span Q (1 , X, . . . , X n − 1 ) where n = deg f Field embeddings: σ j ( a ) = � a i α ji ∈ C where f = � i ≤ n ( X − α j ) . f has s 1 real roots and 2 s 2 (conjugate) complex roots. Two representations Coefficient embedding “Canonical” embedding → a = ( a 0 , . . . , a n − 1 ) ⊤ ∈ Q n → σ ( a ) = ( σ 1 ( a ) , . . . , σ n ( a )) ⊤ ∈ H a �− a �− σ ( ab ) = ( σ i ( a ) σ i ( b )) i ≤ n H is a R -inner-product space of dimension n in C n “canonical norm” � = “coefficient norm” 14/35 A. Wallet

  22. The ring of algebraic integers O K = { x ∈ K roots of monic polynomials in Z [ X ] } It is a lattice: O K = Z b 1 + . . . + Z b n for some b i ∈ O K ( b i � = 0) . (As any lattice, it has a dual O ∨ K .) O K : regularization of Z [ X ] /f O K : intrinsic to K . (in general, R � O K ) Structure independent from f It may not be possible to take Computing a Z -basis for O K 1 , X, . . . , X n − 1 as a basis is usually hard . 15/35 A. Wallet

  23. Ring-LWE (RLWE) [LPR10] New ring choice: O K,q = O K /q O K . α 1 , . . . , α n ∈ C : roots of f . algebraic integers complex vectors/matrices s ∈ O ∨ σ ( s ) = ( s ( α 1 ) , . . . , s ( α n )) ∈ C n K,q Product: a · s Mult. by a coordinate-wise σ ( as ) = ( a ( α 1 ) s ( α 1 ) , . . . , a ( α n ) s ( α n )) D ( a ) := Diag ( a ( α 1 ) , . . . , a ( α n )) . 16/35 A. Wallet

  24. RLWE [LPR’10] R � O K , use canonical embedding. H = Span R ( v 1 , . . . , v n ) ֓ D Σ , outputs e = � e i v i ∈ H . D H Σ : e i ← Assume a Z -basis of O K is known. RLWE ∨ q, Σ ,s distribution: Fix s ∈ O ∨ K,q := O ∨ K /q O ∨ K   a ← ֓ U ( O K,q )  RLWE ∨ ֓ D H q, Σ ,s : e ← Σ   outputs ( a, b = ( as + e ) mod q O ∨ K ) “Primal” variant: RLWE q, Σ ,s with s ∈ O K,q := O K /q O K . the dual appears “naturally” in the reduction for some rings, describing the dual is easy (but then, so is getting to “primal” version) 17/35 A. Wallet

  25. ✓ “Canonical” objects ✓ Flexible (theoretical) tools ✓ More general proofs  � [LPR’10] Decision-RLWE ∨ = Search-RLWE ∨ for Galois fields [PRS’17] Decision ⇒ ApproxSVP for RLWE ∨ , RLWE, PLWE Situation? Using RLWE ∨ variants → Deal with O ∨ K and floating point numbers Z -basis of O K ? → long precomputations, non-uniform reductions In practice (NewHope), f = X 2 d − 1 , O K = Z [ X ] /f and coeff. embedding. What if cyclotomic fields are “weak”? 18/35 A. Wallet

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend