Ring-LWE: A number theorists perspective joint with (Yara Elias, - - PowerPoint PPT Presentation

ring lwe a number theorist s perspective
SMART_READER_LITE
LIVE PREVIEW

Ring-LWE: A number theorists perspective joint with (Yara Elias, - - PowerPoint PPT Presentation

Ring-LWE: A number theorists perspective joint with (Yara Elias, Kristin E. Lauter, and Ekin Ozman) and (Hao Chen and Kristin E. Lauter) SaTC, June 16th, 2016 Learning with errors Let q be prime, n a positive integer. Problem: Find a secret


slide-1
SLIDE 1

Ring-LWE: A number theorist’s perspective

joint with (Yara Elias, Kristin E. Lauter, and Ekin Ozman) and (Hao Chen and Kristin E. Lauter) SaTC, June 16th, 2016

slide-2
SLIDE 2

Learning with errors

Let q be prime, n a positive integer. Problem: Find a secret s ∈ Fn

q given a linear system that s

approximately solves.

  • Gaussian elimination amplifies the ‘errors’, fails to solve

the problem. In other words, find s ∈ (Z/qZ)n given multiple samples (a, a, s + e) ∈ (Z/qZ)n × R/qZ where e is chosen from an error distribution χ on R.

slide-3
SLIDE 3

Toward Ring-LWE

  • Replace (Z/qZ)n with a ring Rq
  • Replace a, s with a · s (ring multiplication)

Search Ring-LWE: Find s ∈ Rq given samples (a, as + e) ∈ Rq × Rq where a ∈ Rq is uniform and e ∈ Rq is taken according to an error distribution χ Decision Ring-LWE: Given samples in Rq × Rq, determine if they are Ring-LWE samples or uniformly chosen.

slide-4
SLIDE 4

Rings of Integers: example Z[i] = Z + Zi

Multiplication by r ∈ R is a linear transformation L → L, x → rx.

slide-5
SLIDE 5

Rings of Integers: example Z[i] = Z + Zi

An ideal is a sublattice I ⊂ R such that R · I = I.

slide-6
SLIDE 6

Discrete vs. continuous

We may wish to form a vector space KR = R ⊗Z R containing R and allow errors to be chosen there. So, find s ∈ Rq given samples (a, as + e) ∈ Rq × KR/qR where a ∈ Rq is uniform and e ∈ KR is taken according to an error distribution χ If one can solve discrete, then one can solve continuous, by rounding the continous samples. Discrete is practical.

slide-7
SLIDE 7

Dual lattices

L∨ = {v : v, L ∈ Z} Lattice Dual

slide-8
SLIDE 8

Dual vs. non-dual

We may wish to allow s, e to live in the dual lattice R∨ (so R∨

q = R∨/qR∨).

So, find s ∈ R∨

q given samples

(a, as + e) ∈ Rq × R∨

q

where a ∈ Rq is uniform and e ∈ R∨

q is taken according to an

error distribution χ. These are equivalent by a change of error distribution.

slide-9
SLIDE 9

Error distribution

The error distribution is usually Gaussian around the origin: ρr(x) = exp(−πx, x/r 2). Need an inner product.

  • Polynomial embedding If K = Q[x]/(f(x)), use

K ֒ → Rn, anxn + . . . + a0 → (an, . . . , a0). then use the standard inner product.

  • Minkowski embedding Use trace pairing:

a, b = tr(ab) ∈ Q, a, b ∈ K.

  • R vs. R∨

The difference is a linear transformation – spherical Gaussian in one is ellipsoidal in another.

slide-10
SLIDE 10

Setting parameters

  • n, dimension
  • q, prime
  • q polynomial in n (security, usability)
  • R, ring of integers
  • 2-power cyclotomics
  • other cyclotomics
  • other rings
  • χ, error distribution, Gaussian, standard deviation σ
  • polynomial dual in practice
  • minkowski dual in theory
  • 2-power cyclotomics. Up to scaling/rotation:

poly dual = mink dual = poly non-dual = mink non-dual

Example: n ≈ 210, q ≈ 231, σ ≈ 8

slide-11
SLIDE 11

Attack on Decision RLWE for (discrete non-dual) polynomial-embedding

(Eisenträger, Hallgren and Lauter) R = Z[x]/(f(x)) potential weakness: f(1) ≡ 0 mod q. Rq evaluation at 1 ring homomorphism

Fq

(a, b = as + e) ✤

(a(1), b(1) = a(1)s(1) + e(1))

Guess s(1) = g, graph supposed errors b(1) − a(1)g: Incorrect Correct

slide-12
SLIDE 12

Abstracting the key idea

If q is a prime above qR, then we have a ring homomorphism φ : Rq = R/(q) → R/q ∼ = Fqf . This preserves the structure of samples: (a, as + e) → (φ(a), φ(a)φ(s) + φ(e)) Possibly weak if

  • 1. image space is small enough to search
  • 2. error distribution is non-uniform after φ

Attack:

  • 1. Loop through g ∈ Fqf for putative φ(s)
  • 2. Test distribution of φ(b) − φ(a)g (putative φ(e)) on

available samples.

slide-13
SLIDE 13

Search-to-decision

K

n

R q1 · · · qg = qR R/qR ∼ = Fqf

f

Q Z q Z/qZ ∼ = Fq R/qR → R/qR

  • Our attacks recover φ(s), i.e., the secret modulo q. That is,

it solves Search-RLWE-q.

Proposition (Eisenträger-Hallgren-Lauter, Chen-Lauter-S.)

Suppose K/Q is Galois of degree n, and q a prime of residual degree f. Suppose there is an oracle which solves Search-RLWE-q. Then by n/f calls to the oracle, it is possible to solve Search-RLWE.

slide-14
SLIDE 14

In practice

There are instances where

  • 1. error is large enough so generic LWE attacks do not apply
  • 2. error is smaller than security reductions require
  • 3. these attacks apply
  • q of degree 1 (→ Fq): Z[x]/(f(x)) with f(x) = xn + q − 1.
  • q of degree 2 (→ Fq2): Q(ζp,

√ d).

  • ramified prime in prime cyclotomic case.
slide-15
SLIDE 15

What’s going on?

The key is the geometry of the lattices q ⊂ R. Perspective 1: The shortest vectors of R either:

  • coincide frequently modulo q, or
  • lie frequently in a subfield modulo q

Perspective 2 (Peikert): The non-uniformity appears in the image of some Rq → Fq, i.e. there is a short vector in q∨ \ R∨.

slide-16
SLIDE 16

Security of an instance of Ring-LWE

  • Fixing R and q, there is a finite list of homomorphisms.
  • Therefore, to be assured of immunity of an instance of

RLWE to this family of attacks, need only check that finitely many distributions look uniform!

slide-17
SLIDE 17

Degree 2 is as fast as Degree 1 (Chen-Lauter-S.)

Setup:

  • φ : Rq → R/q, residue degree 2
  • image of error distribution lies in Fq with probability

distinguishable from 1/q Idea: a and b in sample (a, b = as + e) should correlate if errors are in subfield unusually often.

  • t1, . . . , tq coset representatives of Fq2/Fq
  • Suppose φ(s) = s0 + ti
  • For sample (a, b), write mj(a, b) := bq−b−(atj)q+atj

aq−a

∈ Fq

  • If j = i, mj(a, b) look uniform
  • If j = i, get mj(a, b) = s0 + eq−e

aq−a, has a peak at s0

Attack: Loop through j, checking distribution

slide-18
SLIDE 18

Conclusions

  • The structure inherent in rings is exploitable
  • The vulnerability has sensitive dependence on

parameters

  • properties of the ring
  • properties of q (not just size)
  • properties of the error distribution
slide-19
SLIDE 19

Open Problems

  • What number theoretical properties of R or its ideals

determine the length of the shortest vectors?

  • Similarly, for dual lattices?
  • Geometrically, how does q sit inside R?
  • Short vectors in q∨ \ R∨?
  • How do the shortest vectors of R distribute among cosets
  • f R/q?
  • How do the cosets of q corresponding to a subfield appear

geometrically?

  • If we see non-uniformity modulo q, what types of

non-uniformity are allowed?