Middle-Product Learning with Rounding Problem and Its Applications

被引:7
作者
Bai, Shi [1 ]
Boudgoust, Katharina [2 ]
Das, Dipayan [3 ]
Roux-Langlois, Adeline [2 ]
Wen, Weiqiang [2 ]
Zhang, Zhenfei [4 ]
机构
[1] Florida Atlantic Univ, Dept Math Sci, Boca Raton, FL 33431 USA
[2] Univ Rennes, IRISA, CNRS, Rennes, France
[3] Natl Inst Technol, Dept Math, Durgapur, India
[4] Algorand, Boston, MA 02116 USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I | 2019年 / 11921卷
关键词
LWE; LWR; Middle-Product; Public key encryption; LATTICE; SIGNATURES;
D O I
10.1007/978-3-030-34578-5_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At CRYPTO 2017, Rosca et al. introduce a new variant of the Learning With Errors (LWE) problem, called the Middle-Product LWE (MP-LWE). The hardness of this new assumption is based on the hardness of the Polynomial LWE (P-LWE) problem parameterized by a set of polynomials, making it more secure against the possible weakness of a single defining polynomial. As a cryptographic application, they also provide an encryption scheme based on the MP-LWE problem. In this paper, we propose a deterministic variant of their encryption scheme, which does not need Gaussian sampling and is thus simpler than the original one. Still, it has the same quasi-optimal asymptotic key and ciphertext sizes. The main ingredient for this purpose is the Learning With Rounding (LWR) problem which has already been used to derandomize LWE type encryption. The hardness of our scheme is based on a new assumption called Middle-Product Computational Learning With Rounding, an adaption of the computational LWR problem over rings, introduced by Chen et al. at ASIACRYPT 2018. We prove that this new assumption is as hard as the decisional version of MP-LWE and thus benefits from worst-case to average-case hardness guarantees.
引用
收藏
页码:55 / 81
页数:27
相关论文
共 33 条
[1]  
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[2]  
Alperin-Sheriff J., 2016, IACR Cryptol. ePrint Arch., V2016, P589
[3]  
Alwen J, 2013, LECT NOTES COMPUT SC, V8042, P57, DOI 10.1007/978-3-642-40041-4_4
[4]  
[Anonymous], 2015, 2015 25 INT C FIELD
[5]  
Arora S, 2011, LECT NOTES COMPUT SC, V6755, P403, DOI 10.1007/978-3-642-22006-7_34
[6]   Round5: Compact and Fast Post-quantum Public-Key Encryption [J].
Baan, Hayo ;
Bhattacharya, Sauvik ;
Fluhrer, Scott ;
Garcia-Morchon, Oscar ;
Laarhoven, Thijs ;
Rietman, Ronald ;
Saarinen, Markku-Juhani O. ;
Tolhuizen, Ludo ;
Zhang, Zhenfei .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 :83-102
[7]   Improved Security Proofs in Lattice-Based Cryptography: Using the Renyi Divergence Rather Than the Statistical Distance [J].
Bai, Shi ;
Langlois, Adeline ;
Lepoint, Tancrede ;
Stehle, Damien ;
Steinfeld, Ron .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :3-24
[8]  
Banerjee A., 2011, IACR CRYPTOLOGY EPRI, V2011, P401
[9]  
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[10]   On the Hardness of Learning with Rounding over Small Modulus [J].
Bogdanov, Andrej ;
Guo, Siyao ;
Masny, Daniel ;
Richelson, Silas ;
Rosen, Alon .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 :209-224