on ideal lattices and learning with errors over rings
play

On Ideal Lattices and Learning With Errors Over Rings Vadim - PowerPoint PPT Presentation

On Ideal Lattices and Learning With Errors Over Rings Vadim Lyubashevsky 1 Chris Peikert 2 Oded Regev 1 1 Tel Aviv University 2 Georgia Institute of Technology Eurocrypt 2010 1 / 12 The Learning With Errors Problem [Regev05]


  1. On Ideal Lattices and Learning With Errors Over Rings Vadim Lyubashevsky 1 Chris Peikert 2 Oded Regev 1 1 Tel Aviv University 2 Georgia Institute of Technology Eurocrypt 2010 1 / 12

  2. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . 2 / 12

  3. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’ a 1 ← Z n , b 1 ≈ � a 1 , s � mod q q a 2 ← Z n , b 2 ≈ � a 2 , s � mod q q . . . 2 / 12

  4. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’ a 1 ← Z n , b 1 = � a 1 , s � + e 1 ∈ Z q q a 2 ← Z n , b 2 = � a 2 , s � + e 2 ∈ Z q q . . . √ n ≤ error ≪ q 2 / 12

  5. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’     . . . . . .      = A t s + e A t , b        . . . . . . √ n ≤ error ≪ q 2 / 12

  6. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’     . . . . . .      = A t s + e A t , b        . . . . . . √ n ≤ error ≪ q (After enough uniform a i ’s, secret s is uniquely determined w/hp.) 2 / 12

  7. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’     . . . . . .      = A t s + e A t , b        . . . . . . √ n ≤ error ≪ q (After enough uniform a i ’s, secret s is uniquely determined w/hp.) ◮ Decision: distinguish ( A , b ) from uniform ( A , b ) 2 / 12

  8. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’     . . . . . .      = A t s + e A t , b        . . . . . . √ n ≤ error ≪ q (After enough uniform a i ’s, secret s is uniquely determined w/hp.) ◮ Decision: distinguish ( A , b ) from uniform ( A , b ) LWE is Hard (. . . maybe even for quantum!) worst case ≤ search-LWE ≤ decision-LWE ≤ crypto lattice problems (quantum [R’05]) [BFKL ’93,R’05] 2 / 12

  9. The ‘Learning With Errors’ Problem [Regev’05] ◮ Parameters: dimension n , prime modulus q = poly ( n ) . ◮ Search: find secret s ∈ Z n q given many ‘noisy inner products’     . . . . . .      = A t s + e A t , b        . . . . . . √ n ≤ error ≪ q (After enough uniform a i ’s, secret s is uniquely determined w/hp.) ◮ Decision: distinguish ( A , b ) from uniform ( A , b ) LWE is Hard (. . . maybe even for quantum!) worst case ≤ search-LWE ≤ decision-LWE ≤ crypto lattice problems (quantum [R’05]) [BFKL ’93,R’05] ◮ (Also some classical hardness for search-LWE [P’09]) 2 / 12

  10. LWE is Versatile What kinds of crypto can we do with LWE? 3 / 12

  11. LWE is Versatile What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09] 3 / 12

  12. LWE is Versatile What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09] ◮ Identity-Based Encryption (in RO model) [GPV’08] Hierarchical ID-Based Encryption (w/o RO) [CHKP’10,ABB’10] 3 / 12

  13. LWE is Versatile What kinds of crypto can we do with LWE? ◮ Public Key Encryption [R’05,PVW’08] CCA-Secure PKE (w/o RO) [PW’08,P’09] ◮ Identity-Based Encryption (in RO model) [GPV’08] Hierarchical ID-Based Encryption (w/o RO) [CHKP’10,ABB’10] UC Oblivious Transfer [PVW’08] Leakage Resilience [AGV’09,DGKPV’10,GKPV’10,ADNSWW’10,. . . ] Circular/KDM-Secure Encryption [ACPS’09,BHHI’10] Quadratic-Formula Homomorphic Encryption [GHV’10] Bi-Deniable Encryption [OP’10] and more. . . 3 / 12

  14. LWE is Efficient (. . . sort of) ◮ Getting one extra pseudorandom scalar requires   an n -dim inner product | � �  + e = b ∈ Z q a s  | 4 / 12

  15. LWE is Efficient (. . . sort of) ◮ Getting one extra pseudorandom scalar requires   an n -dim inner product | � �  + e = b ∈ Z q a s  ◮ Can amortize each a over | many secrets s i , but still ˜ O ( n ) work per scalar output. 4 / 12

  16. LWE is Efficient (. . . sort of) ◮ Getting one extra pseudorandom scalar requires   an n -dim inner product | � �  + e = b ∈ Z q a s  ◮ Can amortize each a over | many secrets s i , but still ˜ O ( n ) work per scalar output. ◮ Public key crypto schemes have rather large keys:      . . . .  . .       A t pk = , Ω( n ) b         . .   . .  . . � �� � n 4 / 12

  17. LWE is Efficient (. . . sort of) ◮ Getting one extra pseudorandom scalar requires   an n -dim inner product | � �  + e = b ∈ Z q a s  ◮ Can amortize each a over | many secrets s i , but still ˜ O ( n ) work per scalar output. ◮ Public key crypto schemes have rather large keys:      . . . .  . .       A t pk = , Ω( n ) b         . .   . .  . . � �� � n ◮ Can fix A for all users, but at best, still ˜ Ω( n 2 ) work to encrypt & decrypt an n -bit message 4 / 12

  18. Wishful Thinking. . . ◮ Get n pseudorandom         | | | | scalars from just one  ⋆  +  =  ∈ Z n a s e b     q (cheap) product operation? | | | | 5 / 12

  19. Wishful Thinking. . . ◮ Get n pseudorandom         | | | | scalars from just one  ⋆  +  =  ∈ Z n a s e b     q (cheap) product operation? | | | | Question ◮ How to define the product ‘ ⋆ ’ so that distribution is pseudorandom? 5 / 12

  20. Wishful Thinking. . . ◮ Get n pseudorandom         | | | | scalars from just one  ⋆  +  =  ∈ Z n a s e b     q (cheap) product operation? | | | | Question ◮ How to define the product ‘ ⋆ ’ so that distribution is pseudorandom? ⋆ Careful: w/ small error, coordinate-wise multiplication is not secure! 5 / 12

  21. Wishful Thinking. . . ◮ Get n pseudorandom         | | | | scalars from just one  ⋆  +  =  ∈ Z n a s e b     q (cheap) product operation? | | | | Question ◮ How to define the product ‘ ⋆ ’ so that distribution is pseudorandom? ⋆ Careful: w/ small error, coordinate-wise multiplication is not secure! Answer ◮ ‘ ⋆ ’ = Multiplication in a polynomial ring: e.g., Z q [ x ] / ( x n + 1 ) . Very fast and practical with FFT / NTT: n log n operations mod q . 5 / 12

  22. Wishful Thinking. . . ◮ Get n pseudorandom         | | | | scalars from just one  ⋆  +  =  ∈ Z n a s e b     q (cheap) product operation? | | | | Question ◮ How to define the product ‘ ⋆ ’ so that distribution is pseudorandom? ⋆ Careful: w/ small error, coordinate-wise multiplication is not secure! Answer ◮ ‘ ⋆ ’ = Multiplication in a polynomial ring: e.g., Z q [ x ] / ( x n + 1 ) . Very fast and practical with FFT / NTT: n log n operations mod q . ◮ Similar ring structures appear in heuristic NTRU scheme [HPS’98] , in compact one-way / CR hash functions [Mic’02,PR’06,LM’06,. . . ] , and in fully homomorphic encryption [Gen’09] . 5 / 12

  23. Our Results 0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 6 / 12

  24. Our Results 0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems: worst case on ≤ search Ring-LWE ≤ decision Ring-LWE ideal lattices (quantum, any ring of ints) (classical, any cyclotomic ring) 6 / 12

  25. Our Results 0 Definition: a suitable ‘compact’ version of LWE called Ring-LWE 1 Two main theorems: worst case on ≤ search Ring-LWE ≤ decision Ring-LWE ideal lattices (quantum, any ring of ints) (classical, any cyclotomic ring) ⋆ Concurrently & using different techniques, [SSTX’09] proved a qualitatively weaker version of our first (quantum) reduction. (Specifically: hardness for bounded # of samples in a specific ring.) 6 / 12

Recommend


More recommend