Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert
Georgia Institute of Technology Lattice Crypto Day ENS, 29 May 2010
1 / 23
Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond - - PowerPoint PPT Presentation
Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert Georgia Institute of Technology Lattice Crypto Day ENS, 29 May 2010 1 / 23 Talk Agenda 1 Lattice-based trapdoor functions and oblivious sampling 2
1 / 23
1 Lattice-based trapdoor functions and ‘oblivious’ sampling 2 Applications: signatures, ID-based encryption (in RO model) 3 ‘Bonsai trees:’ removing the RO & more advanced apps
2 / 23
1 Lattice-based trapdoor functions and ‘oblivious’ sampling 2 Applications: signatures, ID-based encryption (in RO model) 3 ‘Bonsai trees:’ removing the RO & more advanced apps
2 / 23
3 / 23
4 / 23
(Images courtesy xkcd.org) 5 / 23
(Images courtesy xkcd.org) 5 / 23
(Images courtesy xkcd.org) 5 / 23
(Images courtesy xkcd.org) 5 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
6 / 23
s1 s2 b1 b2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
s1 s2 7 / 23
b1 b2 7 / 23
s1 s2
1 Generating ‘hard’ lattice together with short basis
7 / 23
s1 s2
1 Generating ‘hard’ lattice together with short basis 2 Signing algorithm leaks secret basis!
⋆ Total break after several signatures [NguyenRegev’06] 7 / 23
8 / 23
8 / 23
8 / 23
8 / 23
8 / 23
8 / 23
f
b1 b2 9 / 23
f
v x u 9 / 23
f
u 9 / 23
f
u
9 / 23
f
u
9 / 23
f −1
⋆ Output distribution leaks no information about S ! 10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2 10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2 10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2 10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2 10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2
10 / 23
f −1
⋆ Output distribution leaks no information about S !
u s1 s2
10 / 23
q
11 / 23
q
q, consider integer solutions z ∈ Zm of:
11 / 23
q
q, consider integer solutions z ∈ Zm of:
11 / 23
q
q, consider integer solutions z ∈ Zm of:
11 / 23
q
q, consider integer solutions z ∈ Zm of:
1 Solutions z form a ‘hard’ lattice L ⊆ Zm
O (0, q) (q, 0) 11 / 23
q
q, consider integer solutions z ∈ Zm of:
1 Solutions z form a ‘hard’ lattice L ⊆ Zm 2
O (0, q) (q, 0) s1 s2 11 / 23
q
q, consider integer solutions z ∈ Zm of:
1 Solutions z form a ‘hard’ lattice L ⊆ Zm 2
3 Gaussian x ↔ syndrome u = Ax = fA(x)
O (0, q) (q, 0) x 11 / 23
q
q, consider integer solutions z ∈ Zm of:
1 Solutions z form a ‘hard’ lattice L ⊆ Zm 2
3 Gaussian x ↔ syndrome u = Ax = fA(x)
⋆ Given u, hard to find short x ∈ f −1
A (u).
⋆ But given basis S, can sample f −1
A (u)!
O (0, q) (q, 0) x 11 / 23
12 / 23
13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) 13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . 13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . 13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . ⋆ Messages to Carol remain secret, even given skAlice, skBob, . . . 13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . ⋆ Messages to Carol remain secret, even given skAlice, skBob, . . .
13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . ⋆ Messages to Carol remain secret, even given skAlice, skBob, . . .
13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . ⋆ Messages to Carol remain secret, even given skAlice, skBob, . . .
13 / 23
⋆ ‘Master’ keys mpk (public) and msk (held by trusted authority) ⋆ Given mpk, can encrypt to ID “Alice” or “Bob” or . . . ⋆ Using msk, authority can calculate skAlice or skBob or . . . ⋆ Messages to Carol remain secret, even given skAlice, skBob, . . .
13 / 23
q, uniform ai ∈ Zn q
14 / 23
q, uniform ai ∈ Zn q
14 / 23
q, uniform ai ∈ Zn q
14 / 23
q, uniform ai ∈ Zn q
14 / 23
q, uniform ai ∈ Zn q
14 / 23
q, uniform ai ∈ Zn q
14 / 23
15 / 23
(public key) 15 / 23
(public key)
(ciphertext ‘preamble’) 15 / 23
(public key)
(ciphertext ‘preamble’)
(‘pad’) 15 / 23
(public key)
(ciphertext ‘preamble’)
2⌋
(‘payload’)
(‘pad’) 15 / 23
(public key)
(ciphertext ‘preamble’)
2⌋
(‘payload’)
(‘pad’) 15 / 23
(public key)
(ciphertext ‘preamble’)
2⌋
(‘payload’)
(‘pad’)
15 / 23
(public key)
(ciphertext ‘preamble’)
2⌋
(‘payload’)
(‘pad’)
15 / 23
(‘identity’ key)
(ciphertext randomness)
2⌋
(‘payload’)
(‘pad’)
A (u)
16 / 23
17 / 23
18 / 23
18 / 23
1 Hierarchy of TDFs
19 / 23
1 Hierarchy of TDFs
2 Techniques for selective ‘control’ of growth & delegation of control
19 / 23
1 Hierarchy of TDFs
2 Techniques for selective ‘control’ of growth & delegation of control 3 Applications: ‘hash-and-sign,’ (hierarchical) IBE
19 / 23
20 / 23
1 Controlling fv (knowing trapdoor) =
20 / 23
1 Controlling fv (knowing trapdoor) =
2 Can grow a controlled branch off of any uncontrolled node.
20 / 23
1 Controlling fv (knowing trapdoor) =
2 Can grow a controlled branch off of any uncontrolled node.
20 / 23
1 Controlling fv (knowing trapdoor) =
2 Can grow a controlled branch off of any uncontrolled node.
3 Can delegate control of any subtree, w/o endangering ancestors.
20 / 23
21 / 23
21 / 23
S1 0 0 I
21 / 23
S1 0 0 I
21 / 23
S1 0 0 I
21 / 23
S1 0 0 I
21 / 23
S1 0 0 I
21 / 23
1 Noninteractive (Statistical) Zero Knowledge [PV’08] 2 Universally Composable Oblivious Transfer [PVW’08] 3 CCA-Secure Encryption [P’09] 4 Many-add, Single-mult Homomorphic Encryption [GHV’10] 5 Bonsai trees with smaller keys [ABB’10] 6 (Bi-)Deniable Encryption [OP’10] 7 Whatever you can invent!
22 / 23
23 / 23
23 / 23