Graph-Induced Multilinear Maps from Lattices

作者: Craig Gentry , Sergey Gorbunov , Shai Halevi

DOI: 10.1007/978-3-662-46497-7_20

关键词: Graph (abstract data type)CryptographyDiscrete mathematicsComputer scienceLearning with errorsDirected graphKey exchangeMultilinear mapEncryptionMultiplication

摘要: Graded multilinear encodings have found extensive applications in cryptography ranging from non-interactive key exchange protocols, to broadcast and attribute-based encryption, even software obfuscation. Despite seemingly unlimited applicability, essentially only two candidate constructions are known (GGH CLT). In this work, we describe a new graph-induced encoding scheme lattices. the arithmetic operations that allowed restricted through an explicitly defined directed graph (somewhat similar “asymmetric variant” of previous schemes). Our construction encodes Learning With Errors (LWE) samples short square matrices higher dimensions. Addition multiplication corresponds naturally addition LWE secrets. Security is not follow hardness (or any other “nice” assumption), at present it requires making assumptions.

参考文章(39)
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi, Practical Multilinear Maps over the Integers international cryptology conference. ,vol. 2013, pp. 476- 493 ,(2013) , 10.1007/978-3-642-40041-4_26
Vadim Lyubashevsky, Chris Peikert, Oded Regev, A Toolkit for Ring-LWE Cryptography theory and application of cryptographic techniques. ,vol. 7881, pp. 35- 54 ,(2013) , 10.1007/978-3-642-38348-9_3
Ron D. Rothblum, On the Circular Security of Bit-Encryption Theory of Cryptography. pp. 579- 598 ,(2013) , 10.1007/978-3-642-36594-2_32
Craig Gentry, Amit Sahai, Brent Waters, Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based international cryptology conference. ,vol. 2013, pp. 75- 92 ,(2013) , 10.1007/978-3-642-40041-4_5
Daniele Micciancio, Chris Peikert, Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller Advances in Cryptology – EUROCRYPT 2012. pp. 700- 718 ,(2012) , 10.1007/978-3-642-29011-4_41
Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai, Discrete Gaussian Leftover Hash Lemma over Infinite Domains international cryptology conference. pp. 97- 116 ,(2013) , 10.1007/978-3-642-42033-7_6
Adeline Langlois, Damien Stehlé, Ron Steinfeld, None, GGHLite: More Efficient Multilinear Maps from Ideal Lattices theory and application of cryptographic techniques. pp. 239- 256 ,(2014) , 10.1007/978-3-642-55220-5_14
Dan Boneh, Mark Zhandry, Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Advances in Cryptology – CRYPTO 2014. ,vol. 2013, pp. 480- 499 ,(2014) , 10.1007/978-3-662-44371-2_27
Rafael Pass, Karn Seth, Sidharth Telang, Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Advances in Cryptology – CRYPTO 2014. pp. 500- 517 ,(2014) , 10.1007/978-3-662-44371-2_28
Markus Rückert, Dominique Schröder, Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles information security and assurance. pp. 750- 759 ,(2009) , 10.1007/978-3-642-02617-1_76