On Codes and Learning with Errors over Function Fields

被引:4
作者
Bombar, Maxime [1 ,2 ]
Couvreur, Alain [1 ,2 ]
Debris-Alazard, Thomas [1 ,2 ]
机构
[1] Ecole Polytech, Inst Polytech Paris, LIX, CNRS UMR 7161, 1 Rue Honore Estienne Orves, F-91120 Palaiseau, France
[2] Inria Saclay, Palaiseau, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II | 2022年 / 13508卷
关键词
Code-based cryptography; Search to decision reductions; LWE; Function fields; Carlitz modules; AVERAGE-CASE REDUCTIONS;
D O I
10.1007/978-3-031-15979-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is a long standing open problem to find search to decision reductions for structured versions of the decoding problem of linear codes. Such results in the lattice-based setting have been carried out using number fields: Polynomial-LWE, Ring-LWE, Module-LWE and so on. We propose a function field version of the LWE problem. This new framework leads to another point of view on structured codes, e.g. quasi-cyclic codes, strengthening the connection between lattice-based and code-based cryptography. In particular, we obtain the first search to decision reduction for structured codes. Following the historical constructions in lattice-based cryptography, we instantiate our construction with function fields analogues of cyclotomic fields, namely Carlitz extensions, leading to search to decision reductions on various versions of Ring-LPN, which have applications to secure multiparty computation and to an authentication protocol.
引用
收藏
页码:513 / 540
页数:28
相关论文
共 37 条
[1]  
Aguilar Melchor C, 2021, ROUND 3 SUBMISSION N, V4
[2]  
Ajtai M., 1997, PROC 29 S THEORY COM, P284, DOI [DOI 10.1145/258533.258604, 10.1145/258533.258604]
[3]  
Alagic Gorjan., 2020, Status report on the second round of the nist post-quantum cryptography standardization process, DOI [10.6028/NIST.IR.8309, DOI 10.6028/NIST.IR.8309]
[4]   More on average case vs approximation complexity [J].
Alekhnovich, M .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :298-307
[5]  
[Anonymous], 2005, P INT WORKSH COD CRY
[6]  
Beelen P, 2008, SER CODING THEORY CR, V5, P49
[7]   Efficient Pseudorandom Correlation Generators from Ring-LPN [J].
Boyle, Elette ;
Couteau, Geoffroy ;
Gilboa, Niv ;
Ishai, Yuval ;
Kohl, Lisa ;
Scholl, Peter .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT II, 2020, 12171 :387-416
[8]   A simple proof of Noether's theorem [J].
Chapman, RJ .
GLASGOW MATHEMATICAL JOURNAL, 1996, 38 :49-51
[9]  
Conrad K., Carlitz Extensions
[10]  
Courtois Nicolas., 2001, LNCS, P157, DOI [DOI 10.1007/3-540-45682-1_10, 10.1007/3-540-45682-110, DOI 10.1007/3-540-45682-110]