On ideal lattices and learning with errors over rings

作者: Vadim Lyubashevsky , Chris Peikert , Oded Regev

DOI: 10.1007/978-3-642-13190-5_1

关键词: MathematicsQuantum algorithmLattice problemNTRUAlgebraLearning with errorsTheoretical computer sciencePseudorandom number generatorHash functionLattice-based cryptographyCryptosystem

摘要: The “learning with errors” (LWE) problem is to distinguish random linear equations, which have been perturbed by a small amount of noise, from truly uniform ones. has shown be as hard worst-case lattice problems, and in recent years it served the foundation for plethora cryptographic applications. Unfortunately, these applications are rather inefficient due an inherent quadratic overhead use LWE. A main open question was whether LWE its could made efficient exploiting extra algebraic structure, done lattice-based hash functions (and related primitives). We resolve this affirmative introducing variant called ring-LWE, proving that too enjoys very strong hardness guarantees. Specifically, we show ring-LWE distribution pseudorandom, assuming problems on ideal lattices polynomial-time quantum algorithms. Applications include first practical public-key cryptosystem security reduction; moreover, many other can much more through ring-LWE. Finally, structure might lead new previously not known based

参考文章(37)
Joël Alwen, Chris Peikert, Generating Shorter Bases for Hard Random Lattices Theory of Computing Systems \/ Mathematical Systems Theory. ,vol. 48, pp. 535- 553 ,(2011) , 10.1007/S00224-010-9278-3
M. Ajtai, Generating hard instances of lattice problems (extended abstract) symposium on the theory of computing. pp. 99- 108 ,(1996) , 10.1145/237814.237838
Chris Peikert, Brent Waters, Lossy trapdoor functions and their applications Proceedings of the fourtieth annual ACM symposium on Theory of computing - STOC 08. pp. 187- 196 ,(2008) , 10.1145/1374376.1374406
Vadim Lyubashevsky, Lattice-Based Identification Schemes Secure Under Active Attacks Public Key Cryptography – PKC 2008. pp. 162- 179 ,(2008) , 10.1007/978-3-540-78440-1_10
Chris Peikert, Vinod Vaikuntanathan, Brent Waters, A Framework for Efficient and Composable Oblivious Transfer international cryptology conference. pp. 554- 571 ,(2008) , 10.1007/978-3-540-85174-5_31
Oded Goldreich, Shai Halevi, Shafi Goldwasser, Collision-Free Hashing from Lattice Problems Electronic Colloquium on Computational Complexity. ,vol. 3, ,(1996)
Chris Peikert, Alon Rosen, Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices Lecture Notes in Computer Science. pp. 145- 166 ,(2006)
Daniele Micciancio, Vadim Lyubashevsky, Generalized Compact Knapsacks Are Collision Resistant Lecture Notes in Computer Science. pp. 144- 155 ,(2006)
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa, Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems international conference on the theory and application of cryptology and information security. pp. 372- 389 ,(2008) , 10.1007/978-3-540-89255-7_23