1. Trang chủ
  2. » Thể loại khác

Advances in cryptology – ASIACRYPT 2016 22nd international conference part i

946 494 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 946
Dung lượng 30,95 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Florian Mendel Graz University of Technology, AustriaAmir Moradi Ruhr University Bochum, Germany Svetla Nikova KU Leuven, Belgium Tatsuaki Okamoto NTT, Japan Elisabeth Oswald University

Trang 1

Jung Hee Cheon

123

22nd International Conference on the Theory

and Application of Cryptology and Information Security Hanoi, Vietnam, December 4–8, 2016, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2016

Trang 2

Lecture Notes in Computer Science 10031Commenced Publication in 1973

Founding and Former Series Editors:

Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Trang 3

More information about this series at http://www.springer.com/series/7410

Trang 4

Jung Hee Cheon • Tsuyoshi Takagi (Eds.)

ASIACRYPT 2016

22nd International Conference on the Theory

and Application of Cryptology and Information Security

Proceedings, Part I

123

Trang 5

Jung Hee Cheon

Seoul National University

Seoul

Korea (Republic of)

Tsuyoshi TakagiKyushu UniversityFukuoka

Japan

ISSN 0302-9743 ISSN 1611-3349 (electronic)

Lecture Notes in Computer Science

ISBN 978-3-662-53886-9 ISBN 978-3-662-53887-6 (eBook)

DOI 10.1007/978-3-662-53887-6

Library of Congress Control Number: 2016956613

LNCS Sublibrary: SL4 – Security and Cryptology

© International Association for Cryptologic Research 2016

This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on micro films or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.

The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a speci fic statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made.

Printed on acid-free paper

This Springer imprint is published by Springer Nature

The registered company is Springer-Verlag GmbH Germany

The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany

Trang 6

ASIACRYPT 2016, the 22nd Annual International Conference on Theory andApplication of Cryptology and Information Security, was held at InterContinentalHanoi Westlake Hotel in Hanoi, Vietnam, during December 4–8, 2016 The conferencefocused on all technical aspects of cryptology, and was sponsored by the InternationalAssociation for Cryptologic Research (IACR)

Asiacrypt 2016 received a total of 240 submissions from all over the world TheProgram Committee selected 67 papers from these submissions for publication in theproceedings of this conference The review process was made via the usual double-blind pier review by the Program Committee comprising 43 leading experts in thefield.Each submission was reviewed by at least three reviewers and five reviewers wereassigned to submissions co-authored by Program Committee members This year, theconference operated a two-round review system with a rebuttal phase In thefirst-roundreview the Program Committee selected the 140 submissions that were considered ofvalue for proceeding to the second round In the second-round review the ProgramCommittee further reviewed the submissions by taking into account their rebuttal letterfrom the authors The selection process was assisted by a total of 309 externalreviewers These two-volume proceedings contain the revised versions of the papersthat were selected The revised versions were not reviewed again and the authors areresponsible for their contents

The program of Asiacrypt 2016 featured three excellent invited talks Nadia Heningergave a talk on“The Reality of Cryptographic Deployments on the Internet,” HoeteckWee spoke on “Advances in Functional Encryption,” and Neal Koblitz gave a non-technical lecture on“Cryptography in Vietnam in the French and American Wars.” Theconference also featured a traditional rump session that contained short presentations onthe latest research results of thefield The Program Committee selected the work “FasterFully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds” by IlariaChillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène for the Best PaperAward of Asiacrypt 2016 Two more papers,“Nonlinear Invariant Attack—PracticalAttack on Full SCREAM, iSCREAM, and Midori64” by Yosuke Todo, Gregor Leander,

Yu Sasaki and “Cliptography: Clipping the Power of Kleptographic Attacks” byAlexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou were solicited to submitfull versions to the Journal of Cryptology

Many people contributed to the success of Asiacrypt 2016 We would like to thankthe authors for submitting their research results to the conference We are very grateful

to all of the Program Committee members as well as the external reviewers for theirfruitful comments and discussions on their areas of expertise We are greatly indebted toNgo Bao Chau and Phan Duong Hieu, the general co-chairs for their efforts and overallorganization We would also like to thank Nguyen Huu Du, Nguyen Quoc Khanh,Nguyen Duy Lan, Duong Ngoc Thai, Nguyen Ta Toan Khoa, Nguyen Ngoc Tuan,

Trang 7

Le Thi Lan Anh, and the local Organizing Committee for their continuous supports.

We thank Steven Galbraith for expertly organizing and chairing the rump session.Finally we thank Shai Halevi for letting us use his nice software for supporting thepaper submission and review process We also thank Alfred Hofmann, Anna Kramer,and their colleagues at Springer for handling the editorial process of the proceedings

We would like to express our gratitude to our partners and sponsors: XLIM, MicrosoftResearch, CISCO, Intel, Google

Tsuyoshi Takagi

Trang 8

ASIACRYPT 2016

The 22nd Annual International Conference on Theory and Application of Cryptology and Information SecuritySponsored by the International Association for Cryptologic Research (IACR)

December 4–8, 2016, Hanoi, Vietnam

General Co-chairs

Ngo Bao Chau VIASM, Vietnam and University of Chicago, USAPhan Duong Hieu XLIM, University of Limoges, France

Program Co-chairs

Jung Hee Cheon Seoul National University, Korea

Tsuyoshi Takagi Kyushu University, Japan

Program Committee

Elena Andreeva KU Leuven, Belgium

Xavier Boyen Queensland University of Technology, AustraliaAnne Canteaut Inria, France

Chen-Mou Cheng National Taiwan University, Taiwan

Sherman S.M Chow Chinese University of Hong Kong, Hong Kong,

SAR ChinaNico Döttling University of California, Berkeley, USA

Thomas Eisenbarth Worcester Polytechnic Institute, USA

Georg Fuchsbauer École Normale Supérieure, France

Steven Galbraith Auckland University, New Zealand

Sanjam Garg University of California, Berkeley, USA

Vipul Goyal Microsoft Research, India

Jens Groth University College London, UK

Sylvain Guilley Secure-IC S.A.S., France

Alejandro Hevia Universidad de Chile, Chile

Antoine Joux Foundation UPMC and LIP6, France

Xuejia Lai Shanghai Jiaotong University, China

Hyung Tae Lee Nanyang Technological University, SingaporeKwangsu Lee Sejong University, Korea

Dongdai Lin Chinese Academy of Sciences, China

Feng-Hao Liu Florida Atlantic University, USA

Takahiro Matsuda AIST, Japan

Alexander May Ruhr University Bochum, Germany

Trang 9

Florian Mendel Graz University of Technology, Austria

Amir Moradi Ruhr University Bochum, Germany

Svetla Nikova KU Leuven, Belgium

Tatsuaki Okamoto NTT, Japan

Elisabeth Oswald University of Bristol, UK

Thomas Peyrin Nanyang Technological University, SingaporeRei Safavi-Naini University of Calgary, Canada

Peter Schwabe Radboud University, The Netherlands

Jae Hong Seo Myongji University, Korea

Damien Stehlé ENS de Lyon, France

Ron Steinfeld Monash University, Australia

Rainer Steinwandt Florida Atlantic University, USA

Daisuke Suzuki Mitsubishi Electric, Japan

Mehdi Tibouchi NTT, Japan

Hoang Viet Tung University of California Santa Barbara, USADominique Unruh University of Tartu, Estonia

Ivan Visconti University of Salerno, Italy

Huaxiong Wang Nanyang Technological University, SingaporeMeiqin Wang Shandong University, China

Céline BlondeauTobias BoelterCarl BootlandJonathan BootleYuri BorissovChristina BouraColin BoydWouter CastryckDario CatalanoAndrea CerulliGizem CetinPyrros ChaidosNishanth ChandranYu-Chen ChangLin ChangluBinyi ChenCong ChenJie Chen

Ming-Shing Chen

Yu Chen

Céline ChevalierChongwon ChoKyu Young ChoiHeeWon ChungKai-Min ChungEloi de ChériseyMichele CiampiCraig CostelloJoan DaemenRicardo DahabWei DaiBernardo DavidThomas de CnuddeDavid DerlerApoorvaa DeshpandeChristoph DobraunigYarkin DorozMing Duan

Léo DucasVIII ASIACRYPT 2016

Trang 10

Dung Hoang Duong

Ai IshidaTakanori IsobeTetsu IwataAayush JainSune JakobsenYin JiaShaoquan JiangChethan KamathSabyasachi KaratiSayasachi KaratiYutaka KawaiCarmen KempkaHeeSeok KimHyoseung KimJinsu KimMyungsun KimTaechan KimPaul KirchnerElena KirshanovaFuyuki KitagawaSusumu KiyoshimaJessica KochMarkulf KohlweissVladimir KolesnikovThomas KorakYoshihiro KosekiAshutosh KumarRanjit KumaresanPo-Chun KuoRobert KüblerThijs LaarhovenChing-Yi LaiRussell W.F LaiVirginie LallemandAdeline LangloisSebastian Lauer

Su LeGregor LeanderKwangsu Lee

Gặtan LeurentAnthony LeverrierJingwei LiMing LiWen-Ding Li

Benoit LibertFuchun LinTingting LinMeicheng LiuYunwen LiuZhen LiuZidong LuYiyuan LuoAtul LuykxVadim LyubashevskyBernardo MagriMary MallerAlex MalozemoffAntonio MarcedoneBenjamin MartinDaniel MartinMarco MartinoliDaniel MasnyMaike MassiererMitsuru MatsuiWilli MeierBart MenninkPeihan MiaoKazuhiko MinematsuNicky MouhaPratyay MukherjeeSean Murphy

Jưrn Müller-QuadeValérie NachefMichael NaehrigMatthias NagelYusuke NaitoMridul NandiMaría Naya-PlasenciaKartik NayakKhoa NguyenIvica NikolicVentzislav NikovRyo NishimakiAnca NitulescuKoji NuidaMaciej ObremskiToshihiro OhigashiMiyako OhkuboSumit Kumar PandeyJong Hwan Park

Trang 11

Berk SunarKoutarou SuzukiAlan SzepieniecMostafa TahaSomayeh TaheriJunko TakahashiKatsuyuki TakashimaBenjamin TanJean-Pierre TillichJunichi TomidaYiannis TselekounisHimanshu TyagiThomas UnterluggauerDamien VergnaudGilles VillardVanessa VitseDamian VizarMichael WalterHan WangHao WangQiungju WangWei WangYuyu WangYohei WatanabeHoeteck WeeWei WeiMor WeissMario WernerBas Westerbaan

Carolyn WhitnallAlexander WildBaofeng WuKeita XagawaZejun XiangHong XuWeijia XueShota YamadaTakashi YamakawaHailun YanJun YanBo-Yin YangBohan YangGuomin YangMohan YangShang-Yi YangKan YasudaXin YeWentan YiScott YilekKazuki YoneyamaRina ZeitounFan ZhangGuoyan ZhangLiang Feng ZhangLiangfeng ZhangTao ZhangWentao ZhangYusi ZhangZongyang ZhangJingyuan ZhaoYongjun ZhaoYixin ZhongHong-Sheng ZhouXiao ZhouJincheng Zhuang

Local Organizing Committee

Co-chairs

Ngo Bao Chau VIASM, Vietnam and University of Chicago, USAPhan Duong Hieu XLIM, University of Limoges, France

Trang 12

Nguyen Huu Du VIASM, Vietnam

Nguyen Quoc Khanh Vietcombank, Vietnam

Nguyen Duy Lan Microsoft Research, USA

Duong Ngoc Thai Google, USA

Nguyen Ta Toan Khoa NTU, Singapore

Nguyen Ngoc Tuan VIASM, Vietnam

Le Thi Lan Anh VIASM, Vietnam

Trang 13

Invited Talks

Trang 14

Advances in Functional Encryption

of the art, with a focus on constructions based on lattices

CNRS, INRIA and Columbia University Supported in part by ERC Project aSCEND (H2020 639554) and NSF Award CNS-1445424.

Trang 15

The Reality of Cryptographic Deployments

on the Internet

Nadia Heninger

University of Pennsylvania, Philadelphia, USA

Abstract.Security proofs for cryptographic primitives and protocols rely on anumber of (often implicit) assumptions about the world in which these compo-nents live They assume that implementations are correct, that specifications arefollowed, that systems make sensible choices about error conditions, and thatreliable sources of random numbers are present However, a number of real worldstudies examining cryptographic deployments have shown that these assump-tions are often not true on a large scale, with catastrophic effects for security

In addition to simple programming errors, many real-world cryptographic nerabilities can be traced back to more complex underlying causes, such asbackwards compatibility, legacy protocols and software, hard-coded resourcelimits, and political interference in design choices

vul-Many of these issues appear on the surface to be at an entirely different level

of abstraction from the cryptographic primitives used in their construction.However, by taking advantage of the structure of many cryptographic primitiveswhen used at Internet scale, it is possible to uncover fundamental vulnerabilities

in implementations I will discuss the interplay between mathematical analysis techniques and the thorny implementation issues that lead to vulnerablecryptographic deployments in the real world

Trang 16

crypt-Contents – Part I

Asiacrypt 2016 Best Paper

Faster Fully Homomorphic Encryption: Bootstrapping in Less

Than 0.1 Seconds 3Ilaria Chillotti, Nicolas Gama, Mariya Georgieva,

and Malika Izabachène

Mathematical Analysis I

A General Polynomial Selection Method and New Asymptotic

Complexities for the Tower Number Field Sieve Algorithm 37Palash Sarkar and Shashank Singh

On the Security of Supersingular Isogeny Cryptosystems 63Steven D Galbraith, Christophe Petit, Barak Shani, and Yan Bo Ti

AES and White-Box

Simpira v2: A Family of Efficient Permutations Using the AES

Round Function 95Shay Gueron and Nicky Mouha

Towards Practical Whitebox Cryptography: Optimizing Efficiency

and Space Hardness 126Andrey Bogdanov, Takanori Isobe, and Elmar Tischhauser

Efficient and Provable White-Box Primitives 159Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner,

and Brice Minaud

Hash Function

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal

Multiplicative Complexity 191Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy,

and Tyge Tiessen

Balloon Hashing: A Memory-Hard Function Providing Provable Protection

Against Sequential Attacks 220Dan Boneh, Henry Corrigan-Gibbs, and Stuart Schechter

Trang 17

Linear Structures: Applications to Cryptanalysis

of Round-Reduced KECCAK 249Jian Guo, Meicheng Liu, and Ling Song

Statistical Fault Attacks on Nonce-Based Authenticated Encryption

Schemes 369Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné,

and Florian Mendel

Authenticated Encryption with Variable Stretch 396Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár

Design Strategies for ARX with Provable Bounds: SPARXand LAX 484Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov,

Johann Großschädl, and Alex Biryukov

SCA and Leakage Resilience I

Side-Channel Analysis Protection and Low-Latency in Action:

– Case Study of PRINCE and Midori – 517Amir Moradi and Tobias Schneider

XVIII Contents– Part I

Trang 18

Characterisation and Estimation of the Key Rank Distribution

in the Context of Side Channel Evaluations 548Daniel P Martin, Luke Mather, Elisabeth Oswald, and Martijn Stam

Taylor Expansion of Maximum Likelihood Attacks for Masked

and Shuffled Implementations 573Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul,

François-Xavier Standaert, and Yannick Teglia

Unknown-Input Attacks in the Parallel Setting: Improving the Security

of the CHES 2012 Leakage-Resilient PRF 602Marcel Medwed, François-Xavier Standaert, Ventzislav Nikov,

and Martin Feldhofer

Block Cipher II

A New Algorithm for the Unbalanced Meet-in-the-Middle Problem 627Ivica Nikolić and Yu Sasaki

Applying MILP Method to Searching Integral Distinguishers Based

on Division Property for 6 Lightweight Block Ciphers 648Zejun Xiang, Wentao Zhang, Zhenzhen Bao, and Dongdai Lin

Reverse Cycle Walking and Its Applications 679Sarah Miracle and Scott Yilek

Cryptographic Applications of Capacity Theory: On the Optimality

of Coppersmith’s Method for Univariate Polynomials 759Ted Chinburg, Brett Hemenway, Nadia Heninger, and Zachary Scherr

A Key Recovery Attack on MDPC with CCA Security

Using Decoding Errors 789Qian Guo, Thomas Johansson, and Paul Stankovski

SCA and Leakage Resilience II

A Tale of Two Shares: Why Two-Share Threshold Implementation Seems

Worthwhile—and Why It Is Not 819Cong Chen, Mohammad Farmani, and Thomas Eisenbarth

Contents– Part I XIX

Trang 19

Cryptographic Reverse Firewall via Malleable Smooth Projective

Hash Functions 844Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo,

and Mingwu Zhang

Efficient Public-Key Cryptography with Bounded Leakage

and Tamper Resilience 877Antonio Faonio and Daniele Venturi

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage

of Arbitrary Functions 908Eiichiro Fujisaki and Keita Xagawa

Author Index 939

XX Contents– Part I

Trang 20

Contents – Part II

Asiacrypt 2016 Award Papers

Nonlinear Invariant Attack: Practical Attack on FullSCREAM,

iSCREAM, and Midori64 3Yosuke Todo, Gregor Leander, and Yu Sasaki

Cliptography: Clipping the Power of Kleptographic Attacks 34Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou

Zero Knowledge

Zero-Knowledge Accumulators and Set Algebra 67Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos,

Roberto Tamassia, and Nikos Triandopoulos

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based

Group Encryption 101Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen,

and Huaxiong Wang

Post Quantum Cryptography

From 5-PassMQ-Based Identification to MQ-Based Signatures 135Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld,

Simona Samardjiska, and Peter Schwabe

Collapse-Binding Quantum Commitments Without Random Oracles 166Dominique Unruh

Digital Signatures Based on the Hardness of Ideal Lattice Problems

in All Rings 196Vadim Lyubashevsky

Trang 21

Selective-Opening Security in the Presence of Randomness Failures 278Viet Tung Hoang, Jonathan Katz, Adam O’Neill, and Mohammad Zaheri

Efficient KDM-CCA Secure Public-Key Encryption

for Polynomial Functions 307Shuai Han, Shengli Liu, and Lin Lyu

Structure-Preserving Smooth Projective Hashing 339Olivier Blazy and Céline Chevalier

Digital Signature

Signature Schemes with Efficient Protocols and Dynamic Group Signatures

from Lattice Assumptions 373Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen,

and Huaxiong Wang

Towards Tightly Secure Lattice Short Signature and Id-Based Encryption 404Xavier Boyen and Qinyi Li

From Identification to Signatures, Tightly: A Framework and Generic

Transforms 435Mihir Bellare, Bertram Poettering, and Douglas Stebila

How to Obtain Fully Structure-Preserving (Automorphic) Signatures

from Structure-Preserving Ones 465Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka,

and Keisuke Tanaka

Functional and Homomorphic Cryptography

Multi-key Homomorphic Authenticators 499Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, and Elena Pagnin

Multi-input Functional Encryption with Unbounded-Message Security 531Vipul Goyal, Aayush Jain, and Adam O’Neill

Verifiable Functional Encryption 557Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, and Amit Sahai

ABE and IBE

Dual System Encryption Framework in Prime-Order Groups

via Computational Pair Encodings 591Nuttapong Attrapadung

XXII Contents– Part II

Trang 22

Efficient IBE with Tight Reduction to Standard Assumption

in the Multi-challenge Setting 624Junqing Gong, Xiaolei Dong, Jie Chen, and Zhenfu Cao

Déjà Q All Over Again: Tighter and Broader Reductions

of q-Type Assumptions 655Melissa Chase, Mary Maller, and Sarah Meiklejohn

Partitioning via Non-linear Polynomial Functions: More Compact IBEs

from Ideal Lattices and Bilinear Maps 682Shuichi Katsumata and Shota Yamada

Foundation

How to Generate and Use Universal Samplers 715Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai,

Brent Waters, and Mark Zhandry

Iterated Random Oracle: A Universal Approach for Finding Loss

in Security Reduction 745Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai,

and Guomin Yang

NIZKs with an Untrusted CRS: Security in the Face of Parameter

Subversion 777Mihir Bellare, Georg Fuchsbauer, and Alessandra Scafuro

Cryptographic Protocol

Universal Composition with Responsive Environments 807Jan Camenisch, Robert R Enderlein, Stephan Krenn, Ralf Küsters,

and Daniel Rausch

A Shuffle Argument Secure in the Generic Model 841Prastudy Fauzi, Helger Lipmaa, and Michał Zając

Efficient Public-Key Distance Bounding Protocol 873Handan Kılınç and Serge Vaudenay

Indistinguishable Proofs of Work or Knowledge 902Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias,

and Bingsheng Zhang

Multi-party Computation

Size-Hiding Computation for Multiple Parties 937Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka,

and Eiji Okamoto

Contents– Part II XXIII

Trang 23

How to Circumvent the Two-Ciphertext Lower Bound for Linear

Garbling Schemes 967Carmen Kempka, Ryo Kikuchi, and Koutarou Suzuki

Constant-Round Asynchronous Multi-Party Computation Based

on One-Way Functions 998Sandro Coretti, Juan Garay, Martin Hirt, and Vassilis Zikas

Reactive Garbling: Foundation, Instantiation, Application 1022Jesper Buus Nielsen and Samuel Ranellucci

Author Index 1053XXIV Contents– Part II

Trang 24

Asiacrypt 2016 Best Paper

Trang 25

Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds

Ilaria Chillotti1(B), Nicolas Gama2,1, Mariya Georgieva3(B),

and Malika Izabach`ene4(B)

1 Laboratoire de Math´ematiques de Versailles, UVSQ, CNRS,

Universit´e Paris-Saclay, 78035 Versailles, France

Abstract In this paper, we revisit fully homomorphic encryption

(FHE) based on GSW and its ring variants We notice that the internalproduct of GSW can be replaced by a simpler external product between

a GSW and an LWE ciphertext

We show that the bootstrapping scheme FHEW of Ducas and ciancio [11] can be expressed only in terms of this external product As

Mic-a result, we obtMic-ain Mic-a speed up from less thMic-an 1 s to less thMic-an 0.1 s Wealso reduce the 1 GB bootstrapping key size to 24 MB, preserving thesame security levels, and we improve the noise propagation overhead byreplacing exact decomposition algorithms with approximate ones

Moreover, our external product allows to explain the unique try in the noise propagation of GSW samples and makes it possible toevaluate deterministic automata homomorphically as in [13] in an effi-cient way with a noise overhead only linear in the length of the testedword

asymme-Finally, we provide an alternative practical analysis of LWE basedscheme, which directly relates the security parameter to the error rate

of LWE and the entropy of the LWE secret key

 International Association for Cryptologic Research 2016

J.H Cheon and T Takagi (Eds.): ASIACRYPT 2016, Part I, LNCS 10031, pp 3–33, 2016.

Trang 26

4 I Chillotti et al.

then, many constructions have appeared involving new mathematical and rithmic concepts and improving efficiency

algo-In homomorphic encryption, messages are encrypted with a noise that grows

at each homomorphic evaluation of an elementary operation In a somewhatencryption scheme, the number of homomorphic operations is limited, but can

be made asymptotically large using bootstrapping [15] This technical trick duced by Gentry allows to evaluate arbitrary circuits by essentially evaluatingthe decryption function on encrypted secret keys This step has remained verycostly until the recent paper of Ducas and Micciancio [11], which presented a

intro-very fast bootstrapping procedure running in around 0.69 s, making an

impor-tant step towards practical FHE for arbitrary NAND circuits In this paper, wefurther improve the bootstrapping procedure

We first provide an intuitive formalization of LWE/RingLWE on numbers orpolynomials over the real torus, obtained by combining the Scale-Invariant-LWEproblem of [9] or the LWE normal form of [10] with the General-LWE problem ofBrakerski-Gentry-Vaikutanathan [5] We call TLWE this unified representation

of LWE ciphertexts, which encode polynomials over the Torus Its security relieseither on the hardness of general or ideal lattice reduction, depending on thechoice of dimensions Using the same formalism, we extend the GSW/RingGSWciphertexts to TGSW, which is the combined analogue of Gentry-Sahai-Water’sciphertexts from [3,16], and which can also instantiate the ring version used inDucas-Micciancio scheme [11] in the FHEW cryptosystem Similarly, a TGSWciphertext encodes an integer polynomial message, and depending on the choice

of dimensions, its security is also based on (worst-case) generic or ideal latticereduction algorithms TLWE and TGSW are basically dual to each other, andthe main idea of our efficiency result comes from the fact that these two schemescan directly be combined together to map the external product of their twomessages into a TLWE sample Since a TGSW sample is essentially a matrixwhose individual rows are TLWE samples, our external product TGSW timesTLWE is much quicker than the usual internal product TGSW times TGSWused in previous work This could mostly be understood as comparing the speed

of the computation of a matrix-vector product to a matrix-matrix product As aresult, we obtain a significant improvement (12 times faster) of the most efficientbootstrapping procedure [11]; it now runs in less than 0.052 s

We also analyze the case of leveled encryption Using an external productmeans that we lose some composability properties in the design of homomorphiccircuits This corresponds to circuits where boolean gates have different kinds ofwires that cannot be freely interconnected Still, we show that we maintain theexpressiveness of the whole binary decision diagram and automata-based logic,which was introduced in [13] with the GSW-GSW internal product, and wetighten the analysis Indeed, while it was impractical (10 transitions per second

in the ring case, and impractical in the non-ring case), we show that the TLWE external product enables to evaluate up to 5000 transitions per second, in

TGSW-a leveled homomorphic mTGSW-anner We TGSW-also refine the mTGSW-apping between TGSW-automTGSW-atTGSW-aand homomorphic gates, and reduce the number of homomorphic operations totest a word with a deterministic automata This allows to compile and evaluate

Trang 27

Faster Fully Homomorphic Encryption 5

constant-time algorithms (i.e with data-independent control flow) in a leveledhomomorphic manner, with only sub-linear noise overhead in the running time

We also propose a new security analysis where the security parameter isdirectly expressed as a function of the entropy of the secret and the error rate.For the parameters that we propose in our implementation, we predict 188-bits

of security for both the bootstrapping key and the keyswitching key

Roadmap In Sect.2, we give mathematical definitions and a quick overview ofthe classical version of LWE-based schemes In Sect.3, we generalize LWE and

GSW schemes using a torus representation of the samples We also review the

arithmetic operations over the torus and introduce our main theorem izing the new morphism between TLWE and TGSW As a proof of concept, wepresent two main applications in Sect.4where we explain our fast bootstrappingprocedure, and in Sect.5, we present efficient leveled evaluation of deterministicautomata, and apply it on a constant-time algorithm with logarithmic memory.Finally, we provide a practical security analysis in Sect.6

Notation In the rest of the paper we will use the following notations The

security parameter will be denoted as λ The set {0, 1} (without any structure)

will be writtenB The real Torus R/Z, called T set of real numbers modulo 1 R

denotes the ring of polynomialsZ[X]/(X N+ 1).TN [X] denotes R[X]/(X N+ 1)mod 1 Finally, we note byM p,q (E) the set of matrices p × q with entries in E.

This section combines some algebra theory, namely abelian groups,

commu-tative rings, R-modules, and on some metrics of the continuous fieldR

Definition 2.1 (R-module) Let (R, +, ×) be a commutative ring We say that

a set M is a R-module when (M, +) is an abelian group, and when there exists an external operation · which is bi-distributive and homogeneous Namely, ∀r, s ∈ R and x, y ∈ M, 1 R · x = x, (r + s) · x = r · x + s · x, r · (x + y) = r · x + r · y, and

(r × s) · x = r · (s · x).

Any abelian group is by construction aZ-module for the iteration (or nentiation) of its own law In this paper, one of the most important abeliangroup we use is the real torus T, composed of all reals modulo 1 (R mod 1).The torus is not a ring, since the real internal product is not compatible withthe modulo 1 projection (expressions like 0×1

expo-2 are undefined) But as an tive group, it is aZ-module, and the external product · from Z × T to T, like in

well defined

Trang 28

6 I Chillotti et al.

Gaussian Distributions Let σ ∈ R+be a parameter and k ≥ 1 the dimension.

For all x, c ∈ R k , we note ρ σ,c (x) = exp(−π x − c22) If c is omitted,

then it is implicitly 0 Let S be a subset of Rk , ρ σ,c (S) denotes 

x ∈S ρ σ,c (x)

or 

x ∈S ρ σ,c (x).dx For all closed (continuous or discrete) additive subgroup

M ⊆ R k , then ρ σ,c (M ) is finite, and defines a (restricted) Gaussian Distribution

of parameter σ, standard deviation

2/πσ and center c over M , with the density

functionD M,σ,c (x) = ρ σ,c (x)/ρ σ,c (M ) Let L be a discrete subgroup of M , then the Modular Gaussian distribution over M/L exists and is defined by the density

D M/L,σ,c (x) = D M,σ,c (x + L) Furthermore, when span(M ) = span(L), then M/L admits a uniform distribution of constant density U M/L In this case, the

smoothing parameter η M,ε (L) of L in M is defined as the smallest σ ∈ R such

that supx ∈M |D M/L,σ,c (x) − U M/L | ≤ ε · U M/L If M is omitted, it implicitly

meansRk

Subgaussian Distributions A distribution X over R is σ-subgaussian iff it

satisfies the Laplace-transformation bound: ∀t ∈ R, E(exp(tX)) ≤ exp(σ2t2/2).

By Markov’s inequality, this implies that the tails of X are bounded by the Gaussian function of standard deviation σ: ∀x > 0, P(|X| ≥ x) ≤

2 exp(−x2/2σ2) As an example, the Gaussian distribution of standard

devia-tion σ (i.e parameter 

π/2σ), the equi-distribution on {−σ, σ}, and the

uni-form distribution over [− √ 3σ, √

3σ], which all have standard deviation σ, are

σ-subgaussian1 If X and X  are two independent σ and σ -subgaussian

vari-ables, then for all α, β ∈ R, αX + βX  is

α2σ2+ β2σ -subgaussian

Distance and Norms We use the standard · p and · ∞ norms for scalarsand vectors over the real field or over the integers By extension, the norm

P (X) p of a real or integer polynomial P ∈ R[X] is the norm of its coefficient

vector If the polynomial is modulo X N + 1, we take the norm of its uniquerepresentative of degree≤ N − 1.

By abuse of notation, we writex p= minu∈x+Z k(u p ) for all x ∈ T k It is

the p-norm of the representative of x with all coefficients in ] − 12,12] Although

it satisfies the separation and the triangular inequalities, this notation is not

a norm, because it lacks homogeneity2, and Tk is not a vector space either.But we have∀m ∈ Z, m · x p ≤ |m| x p By extension, we definea p for a

polynomial a ∈ T N [X] as the p- norm of its unique representative in R[X] of

degree≤ N − 1 and with coefficients in ] −1

Trang 29

Faster Fully Homomorphic Encryption 7

Definition 2.2 (Infinity norm over M p,q(TN [X])) Let A ∈ M p,q(TN [X]).

We define the infinity norm of A as

A ∞= max

i∈[[1,p]]

j∈[[1,q]]

a i,j  ∞

Concentrated Distribution on the Torus, Expectation and Variance

A distribution X on the torus is concentrated iff its support is included in a

ball of radius 1

4 of T, except for negligible probability In this case, we define

the variance Var( X ) and the expectation E(X ) of X as respectively Var(X ) =

minx∈T¯ 

p(x) |x − ¯x|2 and E(X ) as the position ¯x ∈ T which minimizes this

expression By extension, we say that a distribution X  over Tn or TN [X] k isconcentrated iff each coefficient has an independent concentrated distribution

on the torus Then the expectationE(X ) is the vector of expectations of each

coefficient, and Var(X ) denotes the maximum of each coefficient’s Variance.

These expectation and variance overT follow the same linearity rules thantheir classical equivalent over the reals

Fact 2.3 Let X1, X2 be two independent concentrated distributions on either

T, T n orTN [X] k , and e1 , e2∈ Z such that X = e1· X1+ e2 · X2 remains trated, thenE(X ) = e1 ·E(X1)+e2·E(X2) and Var(X ) ≤ e2·Var(X1)+e 2·Var(X2).Also, subgaussian distributions with small enough parameters are necessarilyconcentrated:

concen-Fact 2.4 Every distributionX on either T, T norTN [X] kwhere each coefficient

is σ-subgaussian where σ ≤ 1/32 log(2)(λ + 1) is a concentrated distribution:

a fraction 1− 2 −λ of its mass is in the interval [1

4,14]

2.1 Learning with Error Problem

The Learning With Errors (LWE) problem was introduced by Regev in 2005 [21].The Ring variant, called RingLWE, was introduced by Lyubashevsky, Peikertand Regev in 2010 [19] Both variants are nowadays extensively used for theconstruction of lattice-based Homomorphic Encryption schemes In the originaldefinition [21], a LWE sample has its right member on the torus and is definedusing continuous Gaussian distributions Here, we will work entirely on the realtorus, employing the same formalism as the Scale Invariant LWE (SILWE) scheme

in [9], or LWE scale-invariant normal form in [10] Without loss of generality, werefer to it as LWE

Definition 2.5 ((Homogeneous) LWE) Let n ≥ 1 be an integer, α ∈ R+ be

a noise parameter and s be a uniformly distributed secret in some bounded set

S ∈ Z n Denote by DLWE

s,α the distribution over Tn × T obtained by sampling a

couple (a, b), where the left member a ∈ T n is chosen uniformly random and the

right member b = a · s + e The error e is a sample from a gaussian distribution

with parameter α.

Trang 30

8 I Chillotti et al.

– Search problem: given access to polynomially many LWE samples, find s ∈ S.

– Decision problem: distinguish between LWE samples and uniformly random

samples fromTn × T.

Both the LWE search or decision problems are reducible to each other, andtheir average case is asymptotically as hard as worst-case lattice problems Inpractice, both problems are also intractable, and their hardness increases withthe the entropy of the key setS (i.e n if keys are binary) and α ∈]0, η ε(Z)[.Regev’s encryption scheme [21] is the following: Given a discrete messagespace M ∈ T, for instance {0,1

2}, a message μ ∈ M is encrypted by summing

up the trivial LWE sample (0, μ) of μ to a Homogeneous LWE sample (a, b) ∈

Tn+1

with respect to a secret key s ∈ B n and a noise parameter α ∈ R+ Thesemantic security of the scheme is equivalent to the LWE decisional problem The

decryption of a sample c = (a, b) consists in computing this quantity ϕ s (a, b) =

b − s · a, which we call the phase of c, and to round it to the nearest element in

M Decryption is correct with overwhelming probability 1 − 2 −p provided thatthe parameter α is O(R/ √

p) where R is the packing radius of M.

In this section we extend this presentation to rings, following the generalization

of [5], and also to GSW [16]

3.1 TLWE

We first define TLWE samples, together with the search and decision problems

In the following, ciphertexts are viewed as normal samples

Definition 3.1 (TLWE samples) Let k ≥ 1 be an integer, N a power of 2, and α ≥ 0 be a noise parameter A TLWE secret key s ∈ B N [X] k is a vector of k polynomials ∈ R = Z[X]/X N + 1 with binary coefficients For security purposes,

we assume that private keys are uniformly chosen, and that they actually contain

n ≈ Nk bits of entropy The message space of TLWE samples is T N [X] A fresh TLWE sample of a message μ ∈ T N [X] with noise parameter α under the key

s is an element (a, b) ∈ T N [X] k × T N [X], b ∈ T N [X] has Gaussian distribution

DTN [X],α,sa+μ around μ + s·a The sample is random iff its left member a (also

called mask) is uniformly random ∈ T N [X] k (or a sufficiently dense submodule3),

trivial if a is fixed to 0, noiseless if α = 0, and homogeneous iff its message μ

is 0.

3 A submodule G is sufficiently dense if there exists an intermediate submodule H

such that G ⊆ H ⊆ T n, the relative smoothing parameter η H,ε(G) is ≤ α, and

of at most n − 1 vectors of Z n

This definition allows

to convert any (Ring)-LWE with non-binary secret to a TLWE instance via binarydecomposition

Trang 31

Faster Fully Homomorphic Encryption 9

– Search problem: given access to polynomially many fresh random homogeneous

TLWE samples, find their key s ∈ B N [X] k

– Decision problem: distinguish between fresh random homogeneous TLWE ples from uniformly random samples fromTN [X] k+1

sam-This definition is the analogue on the torus of the General-LWE problem

of [5] It allows to consider both LWE and RingLWE as a single problem

Choos-ing N large and k = 1 corresponds to the classical (bin)RChoos-ingLWE (over tomic rings, and up to a scaling factor q) When N = 1 and k large, thenR and

cyclo-TN [X] respectively collapses toZ and T, and TLWE is simply bin-LWE (up to

the same scaling factor q) Other choices of N, k give some continuum between

the two extremes, with a security that varies between worst-case ideal lattices

to worst-case regular lattices

Thanks to the underlyingR-module structure, we can sum TLWE samples,

or we can make integer linear or polynomial combinations of samples with ficients in R However, each of these combinations increases the noise inside thesamples They are therefore limited to small coefficients

coef-We additionally define a function called the phase of a TLWE sample, thatwill be used many times The phase computation is the first step of the classicaldecryption algorithm, and uses the secret key

Definition 3.2 (Phase) Let c = (a, b) ∈ T N [X] k × T N [X] and s ∈ B N [X] k ,

we define the phase of the sample as ϕ s (c) = b − sa.

The phase is linear over TN [X] k+1 and is (kN + 1)-lipschitzian for the ∞ distance: ∀x, y ∈ T N [X] k+1 , ϕ s (x) − ϕ s (y)≤ (kN + 1) x − y

Note that a TLWE sample contains noise, that its semantic is only function ofits phase, and that the phase has the nice property to be lipschitzian Together,these properties have many interesting implications In particular, we can alwayswork with approximations, since two samples at a short distance onTN [X] k+1

share the same properties: they encode the same message, and they can in general

be swapped This fact explains why we can work and describe our algorithms onthe infinite Torus

Given a finite message space M ⊆ T N [X], the (classical) decryption rithm computes the phase ϕ s (c) of the sample, and returns the closest μ ∈ M.

algo-It is easy to see that if c is a fresh TLWE sample of μ ∈ M with gaussian noise parameter α, the decryption of c over M is equal to μ as soon as α is Θ(

λ)

times smaller than the packing radius of M However decryption is harder to

define for non-fresh samples In this case, correctness of the decryption procedureinvolves a recurrence formula between the decryption of the sum and the sum

of the decryption of the inputs conditioned by the noise parameters In tion, message spaces of the input samples can be in different subgroups of T

addi-To raise the limitations of the decryption function, we will instead use a ematical definition of message and error by reasoning directly on the following

math-Ω-probability space.

Trang 32

10 I Chillotti et al.

Definition 3.3 (The Ω-probability space) Since samples are either

inde-pendent (random, noiseless, or trivial) fresh c ← T LW E s,α (μ), or linear

combi-nation ˜ c =p

i=1 e i ·c i of other samples, the probability space Ω is the product of

the probability spaces of each individual fresh samples c with the TLWE

distribu-tions defined in Definition 3.1 , and of the probability spaces of all the coefficients

(e1 , , e p)∈ R p or Zp that are obtained with randomized algorithm.

In other words, instead of viewing a TLWE sample as a fixed value which is

the result of one particular event in Ω, we will consider all the possible values

at once, and make statistics on them

We now define functions on TLWE samples: message, error, noise variance,and noise norm These functions are well defined mathematically, and can beused in the analysis of various algorithms However, they cannot be directlycomputed or approximated in practice

Definition 3.4 Let c be a random variable ∈ T N [X] k+1 , which we’ll interpret

as a TLWE sample All probabilities are on the Ω-space We say that c is a

valid TLWE sample iff there exists a key s ∈ B N [X] k such that the distribution

of the phase ϕ s (c) is concentrated If c is trivial, all keys s are equivalent, else

the mask of c is uniformly random, so s is unique We then define:

– the message of c, denoted as msg(c) ∈ T N [X] is the expectation of ϕ s (c);

– the error, denoted Err(c), is equal to ϕ s (c) − msg(c);

Var(Err(c)) denotes the variance of Err(c), which is by definition also equal to

the variance of ϕ s (c);

– finally, Err(c) ∞ denotes the maximum amplitude of Err(c) (possibly with

overwhelming probability).

Unlike the classical decryption algorithm, the message function can be viewed

as an ideal black box decryption function, which works with infinite precisioneven if the message space is continuous Provided that the noise amplituderemains smaller than 1

4, the message function is perfectly linear Using theseintuitive and intrinsic functions will considerably ease the analysis of all algo-rithms in this paper In particular, we have:

Fact 3.5 Given p valid and independent TLWE samples c1, , cp under the

same key s, and p integer polynomials e1 , , e p ∈ R, if the linear combination

c =p

i=1 e i c i is a valid TLWE sample, it satisfies: msg(c) =p

i=1 e i msg(c i),

with variance Var(Err(c)) ≤ p

i=1 e i 2 · Var(Err(c i)) and noise amplitude

Err(c) ∞ ≤p

i=1 e i 1· Err(c i) ∞ If the last bound is < 1

4, then c is sarily a valid TLWE sample (under the same key s).

neces-In order to characterize the average case behaviour of our homomorphicoperations, we shall rely on the heuristic assumption of independence below.This heuristic will only be used for practical average-case bounds Our worst-case theorems and lemma based on the infinite norm do not use it at all

Trang 33

Faster Fully Homomorphic Encryption 11

Assumption 3.6 (Independence Heuristic) All the coefficients of the error

of TLWE or TGSW samples that occur in all the linear combinations we consider

are independent and concentrated More precisely, they are σ-subgaussian where

σ is the square-root of their variance.

This assumption allows us to bound the variance of the noise instead ofits norm, and to provide realistic average-case bounds which often correspond

to the square root of the worst-case ones The error can easily be proved gaussian, since each coefficients are always obtained by convolving Gaussians

sub-or zero-centered bounded unifsub-orm distributions But the independence tion between all the coefficients remains heuristic Dependencies between coef-ficients may affect the variance of their combinations in both directions Theindependence of coefficients can be obtained by adding enough entropy in allour decomposition algorithms and by increasing some parameters accordingly,but as noticed in [11], this work-around seems more as a proof artefact, and

assump-is experimentally not needed Since average case corollaries should reflect tical results, we leave the independence of subgaussian samples as a heuristicassumption

Definition 3.7 (Approximate Gadget Decomposition) Let h ∈ M p,k+1

(TN [X]) as in ( 1 ) We say that Dec h,β, (v) is a decomposition algorithm on

the gadget h with quality β and precision  if and only if for any TLWE sample

v ∈ T N [X] k+1 , it efficiently and publicly outputs a small vector u ∈ R (k+1) such that u≤ β and u · h − v≤  Furthermore, the expectation of u · h − v must to be 0 when v is uniformly distributed in T N [X] k+1

Definition3.7 is generic, but in the rest of the paper, we will only use thisfixed gadget:

1/B 

g 0

Trang 34

12 I Chillotti et al.

The matrix h consists in a diagonal of columns, each containing a

super-increasing sequence of constant polynomials in T Algorithm 1 represents an

efficient decomposition of TLWE samples on h, and the following lemma proves

its correctness In theory, decomposition algorithms should be randomized toguarantee that the distribution of all error coefficients remain independent Inpractice, we already rely on Heuristic 3.6 We just need that the expectation ofthe small errors induced by the approximations remains null, so that the message

is not changed

Lemma 3.8 Let ∈ N and B g ∈ N Then for β = B g /2 and  = 1/2B 

g , Algorithm 1 is a valid Dec h,β,

Algorithm 1 Gadget Decomposition of a TLWE sample

6: Return (e i,p)i,p

Proof Let v = (a, b) = (a1, , a k , b = a k+1)∈ T N [X] k+1 be a TLWE sample,given as input to Algorithm1 Let u = [e1,1 , , e k+1,]∈ R (k+1) be the corre-sponding output by constructionu ∞ ≤ B g /2 = β.

Let dec = u · h − v For all i ∈ [[1, k + 1]] and j ∈ [[1, ]], we have by struction  deci,j = 

has therefore a concentrated distribution when v is uniform We now verify that

it is zero-centered Finally, if we call f the function from T to T which rounds

an element x to its closest multiple of B1

g and the function g the symmetry defined by g(x) = 2f (x) − x on the torus; we easily verify that the E(deci,j)

is equal to E(a i,j − f(a i,j )) when a i,j has uniform distribution, which is equal

to E(g(a i,j)− f(g(a i,j ))) when g(a i,j) has uniform distribution also equal to

E(f(a i,j)− a i,j) =−E(deci,j ) Thus, the expectation of decis 0

We are now ready to define TGSW samples, and to extend the notions ofphase of valid sample, message and error of the samples

Definition 3.9 (TGSW samples) Let and k ≥ 1 be two integers, α ≥ 0

be a noise parameter and h the gadget defined in Eq (1) Let s ∈ B N [X] k

Trang 35

Faster Fully Homomorphic Encryption 13

be a RingLWE key, we say that C ∈ M (k+1),k+1(TN [X]) is a fresh TGSW

sample of μ ∈ R/hwith noise parameter α iff C = Z + μh where

each row of Z ∈ M (k+1),k+1(T N [X]) is an Homogeneous TLWE sample (of

0) with Gaussian noise parameter α Reciprocally, we say that an element

C ∈ M (k+1),k+1(TN [X]) is a valid TGSW sample iff there exists a unique

polynomial μ ∈ R/hand a unique key s such that each row of C − μh is a

valid TLWE sample of 0 for the key s We call the polynomial μ the message of

C, and we denote it by msg(C).

Definition 3.10 (Phase, Error) Let A = ∈ M (k+1),k+1(TN [X]) be a TGSW

sample for a secret key s ∈ B N [X] k and noise parameter α ≥ 0.

We define the phase of A, denoted as ϕ s (A) ∈ (T N [X]) (k+1) , as the list of the (k + 1) TLWE phases of each line of A In the same way, we define the error of A, denoted Err(A), as the list of the (k + 1) TLWE errors of each line

of A.

Since TGSW samples are essentially vectors of TLWE samples, they are urally compatible with linear operations And both phase and message functionsremain linear

nat-Fact 3.11 Given p valid TGSW samples C1, , C p of messages μ1, , μ p

under the same key, and with independent error coefficients, and given p integer polynomials e1 , , e p , the linear combination C =p

i=1 e i 1· Err(C) ∞

Also, the phase remains 1 + kN lipschitzian for the infinity norm.

Fact 3.12 For all A ∈ M p,k+1(TN [X]), ϕ s (A)  ∞ ≤ (Nk + 1) A ∞

We finally define the homomorphic product between TGSW and TLWE ples, whose corresponding message is simply the product of the two messages ofthe initial samples Since the left member encodes an integer polynomial, andthe right one a torus polynomial, this operator performs a homomorphic evalu-ation of their external product Theorem3.14(resp Corollary3.15) analyzes theworst-case (resp average-case) noise propagation of this product Then, Corol-lary3.16 relates this new morphism to the classical internal product betweenTGSW samples

sam-Definition 3.13 (External product) We define the product  as

: TGSW × TLWE −→ TLWE

(A, b) −→ A  b = Dec h,β, (b) · A.

The formula is almost identical to the classical product defined in the originalGSW scheme in [16], except that only one vector needs to be decomposed Forthis reason, we get almost the same noise propagation formula, with an additionalterm that comes from the approximations in the decomposition

Trang 36

14 I Chillotti et al.

Theorem 3.14 (Worst-case External Product) Let A be a valid TGSW

sample of message μ A and let b be a valid TLWE sample of message μ b Then A  b is a TLWE sample of message μ A · μ b and Err(A  b) ∞ ≤

(k + 1) N β Err(A) ∞ + μ A 1(1 + kN ) + μ A 1Err(b) ∞ (worst case), where β and  are the parameters used in the decomposition Dec h,β, (b) If

Err(A  b)≤ 1/4 we are guaranteed that A  b is a valid TLWE sample.

Proof As A = TGSW(μ A ), then by definition it is equal to A = Z A + μ A · h,

where Z A is a TGSW encryption of 0 and h is the gadget matrix In the same way, as b = TLWE(μ b ), then by definition it is equal to b = z b + (0, μ b), where

z b is a TLWE encryption of 0 Let

Then the phase (linear function) of A  b is

ϕ s (A  b) = u · Err(A) + μ A · ϕ s ( dec ) + μ A · Err(b) + μ A μ b

Taking the expectation, we get that msg(A  b) = 0 + 0 + 0 + μ A μ b, and so

Err(A  b) = ϕ s (A  b) − μ A μ b Then thanks to Fact3.12, we have

Err(A  b)≤ u · Err(A)+μ A · ϕ( dec) ∞+μ A · Err(b)

≤ (k + 1) Nβη A+μ A 1(1 + kN )  dec  ∞+μ A 1η b

We similarly obtain the more realistic average-case noise propagation, based

on the independence heuristic, by bounding the Gaussian variance instead of theamplitude

Corollary 3.15 (Average-case External Product) Under the same

con-ditions of Theorem 3.14 and by assuming the Heuristic 3.6 , we have that

Var(Err(Ab)) ≤ (k+1) Nβ2Var(Err(A))+(1+kN) μ A 2

2+μ A 2Var(Err(b)).

Trang 37

Faster Fully Homomorphic Encryption 15

Proof Let ϑ A = Var(Err(A)) = Var(ϕ s (Z A )) and ϑ b = Var(Err(b)) =

Var(ϕ s (z b)) By using the same notations as in the proof of Theorem3.14 we

have that the error of A b is Err(Ab) = u·Err(A)+μ A ·ϕ s ( dec ) + μ A ·Err(b)

and thanks to Assumption3.6and Fact3.12, we have:

Var(Err(A  b)) ≤ Var(u · Err(A))) + Var(μ A · ϕ( dec )) + Var(μ A · Err(b))

As we mentioned before, it is much slower to evaluate, because it consists in

(k + 1) independent computations of the  product, which we illustrate now

Corollary 3.16 (Internal Product) Let the product

⎦ ,

with A and B two valid TGSW samples of messages μ A and μ B respectively

and b i corresponding to the i-th line of B Then A  B is a TGSW sample of

message μ A ·μ B and Err(A  B) ∞ ≤ (k+1) Nβ Err(A) ∞+μ A 1(1+kN )+

μ A 1Err(B) ∞ (worst case) If Err(A  B) ∞ ≤ 1/4 we are guaranteed that

A  B is a valid TGSW sample.

Furthermore, by assuming the Heuristic 3.6 , we have that Var(Err(A  B)) ≤

(k + 1) N β2Var(Err(A)) + (1 + kN)(μ A )2+ μ2A Var(Err(b)) (average case).

Proof Let A and B be two TGSW samples, and μ A and μ B their message

By definition, the i-th row of B encodes μ B • h i , so the i-th row of A  B encodes (μ A μ B)h i This proves that A  B encodes μ A μ B Since the internal

product A  B consists in (k + 1) independent runs of the external products

A  b i, the noise propagation formula directly follows from Theorem3.14 and

In the next section, we show that all internal products in the bootstrappingprocedure can be replaced with the external one Consequently, we expect a

speed-up of a factor at least (k + 1)

Than 0.1 Seconds

In this section, we show how to use Theorem3.14to speed-up the bootstrappingpresented in [11] With additional optimizations, we drastically reduce the boot-strapping key size, and also reduce a bit the noise overhead To bootstrap a LWE

Trang 38

16 I Chillotti et al.

sample (a, b) ∈ T n+1, which is rescaled as (¯a, ¯b) mod 2N , using relevant tions of its secret key s ∈ B n, the overall idea is the following We start from afixed polynomial testv∈ T N [X], which is our phase detector: its i-th coefficient

encryp-is set to the value that the bootstrapping should return if ϕ s (a, b) = i/2N testv

is first encoded in a trivial LWE sample Then, we iteratively rotate its ficients, using external multiplications with TGSW encryptions of the hidden

coef-monomials X −s i¯i By doing so, the original testv gets rotated by the (hidden)

phase of (a, b), and in the end, we simply extract the constant term as a LWE

sample

4.1 TLWE to LWE Extraction

Like in previous work, extracting a LWE sample from a TLWE sample simplymeans rewriting polynomials into their list of coefficients, and discarding the

N − 1 last coefficients of b This yields a LWE encryption of the constant term

of the initial polynomial message

Definition 4.1 (TLWE Extraction) Let (a  , b  ) be a TLWE s  (μ)

sam-ple with key s  ∈ R k , We call KeyExtract(s  ) the integer vector s  =

(coefs(s 1(X), , coefs(s  k (X)) ∈ Z kN and SampleExtract(a  , b  ) the LWE

sam-ple (a  , b )∈ T kN +1 where a  = (coefs(a 1(1/X), , coefs(a  k (1/X)) and b  = b 0

the constant term of b  Then ϕ s  (a  , b  ) (resp msg(a  , b  )) is equal to the

con-stant term of ϕ s  (a  , b  ) (resp to the constant term of μ = msg(a  , b  )) And

Err(a  , b ) ∞ ≤ Err(a  , b ) ∞ and Var(Err(a  , b ))≤ Var(Err(a  , b  )).

4.2 LWE to LWE Key-Switching Procedure

Given a LWEs  sample of a message μ ∈ T, the key switching procedure

ini-tially proposed in [5,7] outputs a LWEs sample of the same μ without increasing

the noise too much Contrary to previous exact keyswitch procedures, here wetolerate approximations

Definition 4.2 Let s  ∈ {0, 1} n  , s ∈ {0, 1} n , a noise parameter γ ∈ R and a precision parameter t ∈ N, we call key switching secret KS s  →s,γ,t a sequence of

fresh LWE samples KS i,j ∈ LWE s,γ (s  i · 2 −j ) for i ∈ [1, n  ] and j ∈ [1, t].

Lemma 4.3 (Key switching) Given (a  , b )∈ LWE s  (μ) where s  ∈ {0, 1} n  with noise η  = Err(a  , b ) ∞ and a keyswitching key KSs  →s,γ,t , where s ∈

{0, 1} n , the key switching procedure outputs a LWE sample (a, b) ∈ LWE s n (μ)

where Err(a, b) ∞ ≤ η  + n  tγ + n 2−(t+1) .

Trang 39

Faster Fully Homomorphic Encryption 17

Algorithm 2 KeySwitch procedure

1, , a 

where s  ∈ {0, 1} n 

, s ∈ {0, 1} nandt ∈ N a precision parameter

The expectation of the left side of the equality is equal to msg(a, b) For the

right side, each a i,jis uniformly distributed in{0, 1} and (a 

i −¯a 

i) is a 0-centered

variable so the expectation of the sum is 0 Thus, msg(a, b) = msg(a  , b ) Weobtain s (a, b) − msg(a, b) ∞ ≤ η  + n  · t · γ + n 2−(t+1).

Corollary 4.4 Let t be an integer parameter Under Assumption 3.6 Given

(a  , b )∈ LWE s  (μ) with noise variance η  = Var(Err(a  , b  )) and a key switching

key KSs  →s,γ, , the key switching procedure outputs an LWE sample (a  , b )

LWEs (μ) where Var(Err(a, b)) ≤ η  + n  · t · γ2+ n 2−2(t+1)

4.3 Bootstrapping Procedure

Given a LWE sample LWEs (μ) = (a, b), the bootstrapping procedure constructs

an encryption of μ under the same key s but with a fixed amount of noise As

in [11], we will use TLWE as an intermediate encryption scheme to perform ahomomorphic evaluation of the phase but here we will use its external productfrom Theorem3.14with a TGSW encryption of the key s.

Definition 4.5 Let s ∈ B n , s  ∈ B N [X] k and α be a noise parameter We define the bootstrapping key BK s→s  ,α as the sequence of n TGSW samples where BK i ∈ TGSW s  ,α (s i ).

Trang 40

18 I Chillotti et al.

Algorithm 3 Bootstrapping procedure

keyKSs  →s,γ where s =KeyExtract(s ), two fixed messagesμ0, μ1∈ T



;μ1 else

1: Let ¯μ = μ10

8: Return KeySwitchKS(u)

We first provide a comparison between the bootstrapping of Algorithm3

and [11, Algorithms 1 and 2] proposal

– Like [11], we rescale the computation of the phase of the input LWE sample

so that it is modulo 2N (line 2) and we map all the corresponding operations

in the multiplicative cyclic group{1, X, , X 2N −1 } Since our LWE samples

are described over the real torus, the rescaling is done explicitly in line 2.This rescaling may induce a cumulated rounding error of amplitude at most

δ ≈ √ n/4N in the average case and δ ≤ (n + 1)/4N in the worst case In

the best case, this amplitude can decrease to zero (δ = 0) if in the actual

representation of LWE samples, all the coefficients are restricted to multiple

of 2N1 , which would be the analogue of [11]’s setting

– As in [11], messages are encoded as roots of unity inR Our accumulator is

a TLWE sample instead of a TGSW sample in [11] Also accumulator tions use the external product from Theorem3.14instead of the slower classi-

opera-cal internal product The test vector (1+X+ +X N −1) is embedded in the

accumulator from the very start, when the accumulator is still noiseless while

in [11], it is added at the very end This removes a factor

decom-to this squashing technique, two accumuladecom-tor operations were performed periteration instead of one in our case This gives us an additional 2X speed up

Theorem 4.6 (Bootstrapping Theorem) Let h ∈ M (k+1),k+1(TN [X]) be

the gadget defined in Eq 1 and let Dec h,,β be the associated vector gadget position function.

Ngày đăng: 14/05/2018, 10:50

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
16. Goldreich, O.: On post-modern cryptography. Cryptology ePrint Archive, Report 2006/461 (2006). http://eprint.iacr.org/2006/461 Link
18. Groth, J.: Homomorphic trapdoor commitments to group elements. Cryptology ePrint Archive, Report 2009/007 (2009). http://eprint.iacr.org/2009/007 Link
23. Joux, A., Rojat, A.: Security ranking among assumptions within the uber assump- tion framework. Cryptology ePrint Archive, Report 2013/291 (2013). http://eprint.iacr.org/2013/291 Link
28. Lepoint, T.: Zeroizing attacks on multilinear maps. In: ECRYPT-CSA Work- shop on Tools for Asymmetric Cryptanalysis (2015). http://cryptool.hgi.rub.de/program.html Link
35. Morillo, P., R` afols, C., Villar, J.L.: Matrix computational assumptions in multi- linear groups. Cryptology ePrint Archive, Report 2015/353 (2015). http://eprint.iacr.org/2015/353 Link
40. Shacham, H.: A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007). http://eprint.iacr.org/2007/074 Link
2. Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure- preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7 12 Khác
3. Abe, M., Haralambiev, K., Ohkubo, M.: Group to group commitments do not shrink. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol Khác
5. Barthe, G., Fagerholm, E., Fiore, D., Mitchell, J., Scedrov, A., Schmidt, B.: Auto- mated analysis of cryptographic assumptions in generic group models. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 95–112. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44371-2 6 Khác
6. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). doi:10.1007/978-3-540-28628-8 3 Khác
7. Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-secure encryption from decision Diffie-Hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol Khác
10. Dodis, Y., Haitner, I., Tentes, A.: On the instantiability of hash-and-sign RSA signatures. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 112–132. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28914-9 7 Khác
11. Escala, A., Herold, G., Kiltz, E., R` afols, C., Villar, J.: An algebraic framework for Diffie-Hellman assumptions. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 129–147. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40084-1 8 Khác
12. Escala, A., Herold, G., Kiltz, E. et al.: An algebraic framework for Diffie-Hellman assumptions. J. Cryptol. 1–47 (2015). doi:10.1007/s00145-015-9220-6 Khác
13. Freeman, D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol Khác
15. Gay, R., Hofheinz, D., Kiltz, E., Wee, H.: Tightly CCA-secure encryption without pairings. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 1–27. Springer, Heidelberg (2016). doi:10.1007/978-3-662-49890-3 1 Khác
20. Herold, G.: Applications of classical algebraic geometry to cryptography. Ph.D.thesis, Ruhr-Universit¨ at Bochum (2014) Khác
24. Jutla, C.S., Roy, A.: Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 295–312. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44381-1 17 Khác
25. Kiltz, E., Pan, J., Wee, H.: Structure-preserving signatures from standard assump- tions, revisited. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol Khác
27. Laguillaumie, F., Paillier, P., Vergnaud, D.: Universally convertible directed signa- tures. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 682–701. Springer, Heidelberg (2005). doi:10.1007/11593447 37 Khác

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm