Middle-Product Learning with Rounding Problem and Its Applications

被引:7
作者
Bai, Shi [1 ]
Boudgoust, Katharina [2 ]
Das, Dipayan [3 ]
Roux-Langlois, Adeline [2 ]
Wen, Weiqiang [2 ]
Zhang, Zhenfei [4 ]
机构
[1] Florida Atlantic Univ, Dept Math Sci, Boca Raton, FL 33431 USA
[2] Univ Rennes, IRISA, CNRS, Rennes, France
[3] Natl Inst Technol, Dept Math, Durgapur, India
[4] Algorand, Boston, MA 02116 USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I | 2019年 / 11921卷
关键词
LWE; LWR; Middle-Product; Public key encryption; LATTICE; SIGNATURES;
D O I
10.1007/978-3-030-34578-5_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At CRYPTO 2017, Rosca et al. introduce a new variant of the Learning With Errors (LWE) problem, called the Middle-Product LWE (MP-LWE). The hardness of this new assumption is based on the hardness of the Polynomial LWE (P-LWE) problem parameterized by a set of polynomials, making it more secure against the possible weakness of a single defining polynomial. As a cryptographic application, they also provide an encryption scheme based on the MP-LWE problem. In this paper, we propose a deterministic variant of their encryption scheme, which does not need Gaussian sampling and is thus simpler than the original one. Still, it has the same quasi-optimal asymptotic key and ciphertext sizes. The main ingredient for this purpose is the Learning With Rounding (LWR) problem which has already been used to derandomize LWE type encryption. The hardness of our scheme is based on a new assumption called Middle-Product Computational Learning With Rounding, an adaption of the computational LWR problem over rings, introduced by Chen et al. at ASIACRYPT 2018. We prove that this new assumption is as hard as the decisional version of MP-LWE and thus benefits from worst-case to average-case hardness guarantees.
引用
收藏
页码:55 / 81
页数:27
相关论文
共 33 条
[11]  
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[12]   Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme [J].
Bruinderink, Leon Groot ;
Hulsing, Andreas ;
Lange, Tanja ;
Yarom, Yuval .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :323-345
[13]   Spectral measure of large random Hankel, Markov and Toeplitz matrices [J].
Bryc, W ;
Dembo, A ;
Jiang, TF .
ANNALS OF PROBABILITY, 2006, 34 (01) :1-38
[14]   Provably Weak Instances of Ring-LWE Revisited [J].
Castryck, Wouter ;
Iliashenko, Ilia ;
Vercauteren, Frederik .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :147-167
[15]  
D'Anvers Jan-Pieter, 2018, Progress in Cryptology - AFRICACRYPT 2018. 10th International Conference on Cryptology in Africa. Proceedings: LNCS 10831, P282, DOI 10.1007/978-3-319-89339-6_16
[16]  
Ding Jintai., 2012, IACR Cryptology ePrint Archive, V2012, P688
[17]  
Kaltofen E., 1996, ISSAC, V96, P241
[18]   Worst-case to average-case reductions for module lattices [J].
Langlois, Adeline ;
Stehle, Damien .
DESIGNS CODES AND CRYPTOGRAPHY, 2015, 75 (03) :565-599
[19]  
Long Chen, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11272), P435, DOI 10.1007/978-3-030-03326-2_15
[20]   On Ideal Lattices and Learning with Errors over Rings [J].
Lyubashevsky, Vadim ;
Peikert, Chris ;
Regev, Oded .
JOURNAL OF THE ACM, 2013, 60 (06)