Parameters for Homomorphic Encryption
Kim Laine and Kristin Lauter
University of California, Berkeley and Microsoft Research
Parameters for Homomorphic Encryption Kim Laine and Kristin Lauter - - PowerPoint PPT Presentation
Parameters for Homomorphic Encryption Kim Laine and Kristin Lauter University of California, Berkeley and Microsoft Research September 3, 2015 Homomorphic Encryption Homomorphic Encryption Consider a public key cryptosystem, and operations
University of California, Berkeley and Microsoft Research
Homomorphic Encryption
3 / 34
Homomorphic Encryption
1
2 (mod n)
4 / 34
Homomorphic Encryption
5 / 34
Homomorphic Encryption
6 / 34
Homomorphic Encryption
6 / 34
Homomorphic Encryption
7 / 34
Homomorphic Encryption
1 Encode data to reduce depth of the circuit. 2 Forget about bootstrapping. 3 Select parameters based on the function to be evaluated. 4 Can only do a pre-determined number of homomorphic
8 / 34
LWE and Ring-LWE
10 / 34
LWE and Ring-LWE
q
11 / 34
LWE and Ring-LWE
q × Zq is one such equation.
12 / 34
LWE and Ring-LWE
13 / 34
LWE and Ring-LWE
14 / 34
LWE and Ring-LWE
15 / 34
LWE and Ring-LWE
Z,σ.
16 / 34
LWE and Ring-LWE
Z,σ
17 / 34
Applications
19 / 34
Applications
20 / 34
Applications
22 / 34
Security Properties
O(nq/σ) is easy if LWE is
1Say, bigger than √n.
24 / 34
Security Properties
O(nq/σ) gets easier when q increases, other parameters fixed.
25 / 34
Security Properties
26 / 34
Security Properties
27 / 34
Security Properties
1 Use LLL to find a reduced basis for Λ. 2 Use Babai’s NearestPlanes algorithm to find a lattice point
3 NearestPlanes will recover w ∈ Λ with
4 But v is such a lattice point!
28 / 34
Security Properties
29 / 34
Security Properties
1 Succeeds almost certainly when (d = number of samples)
2 Choose d in a way that maximizes µBound. 3 Run the lattice attack. 4 For security estimates, predict how realized µ is related to the
30 / 34
Security Properties
75 100 125 150 175 200 225 250 275 300 325 350 Dimension of secret: n 0.014 0.016 0.018 0.02 0.022 0.024 0.026 µBound
All experiments were done using SAGE, PARI/GP and fplll. 31 / 34
Security Properties
32 / 34
Security Properties
33 / 34
Security Properties
34 / 34