Florian Mendel Graz University of Technology, AustriaAmir Moradi Ruhr University Bochum, Germany Svetla Nikova KU Leuven, Belgium Tatsuaki Okamoto NTT, Japan Elisabeth Oswald University
Trang 1Jung Hee Cheon
123
22nd International Conference on the Theory
and Application of Cryptology and Information Security Hanoi, Vietnam, December 4–8, 2016, Proceedings, Part I Advances in Cryptology – ASIACRYPT 2016
Trang 2Lecture Notes in Computer Science 10031Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Trang 3More information about this series at http://www.springer.com/series/7410
Trang 4Jung Hee Cheon • Tsuyoshi Takagi (Eds.)
ASIACRYPT 2016
22nd International Conference on the Theory
and Application of Cryptology and Information Security
Proceedings, Part I
123
Trang 5Jung Hee Cheon
Seoul National University
Seoul
Korea (Republic of)
Tsuyoshi TakagiKyushu UniversityFukuoka
Japan
ISSN 0302-9743 ISSN 1611-3349 (electronic)
Lecture Notes in Computer Science
ISBN 978-3-662-53886-9 ISBN 978-3-662-53887-6 (eBook)
DOI 10.1007/978-3-662-53887-6
Library of Congress Control Number: 2016956613
LNCS Sublibrary: SL4 – Security and Cryptology
© International Association for Cryptologic Research 2016
This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on micro films or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a speci fic statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made.
Printed on acid-free paper
This Springer imprint is published by Springer Nature
The registered company is Springer-Verlag GmbH Germany
The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany
Trang 6ASIACRYPT 2016, the 22nd Annual International Conference on Theory andApplication of Cryptology and Information Security, was held at InterContinentalHanoi Westlake Hotel in Hanoi, Vietnam, during December 4–8, 2016 The conferencefocused on all technical aspects of cryptology, and was sponsored by the InternationalAssociation for Cryptologic Research (IACR)
Asiacrypt 2016 received a total of 240 submissions from all over the world TheProgram Committee selected 67 papers from these submissions for publication in theproceedings of this conference The review process was made via the usual double-blind pier review by the Program Committee comprising 43 leading experts in thefield.Each submission was reviewed by at least three reviewers and five reviewers wereassigned to submissions co-authored by Program Committee members This year, theconference operated a two-round review system with a rebuttal phase In thefirst-roundreview the Program Committee selected the 140 submissions that were considered ofvalue for proceeding to the second round In the second-round review the ProgramCommittee further reviewed the submissions by taking into account their rebuttal letterfrom the authors The selection process was assisted by a total of 309 externalreviewers These two-volume proceedings contain the revised versions of the papersthat were selected The revised versions were not reviewed again and the authors areresponsible for their contents
The program of Asiacrypt 2016 featured three excellent invited talks Nadia Heningergave a talk on“The Reality of Cryptographic Deployments on the Internet,” HoeteckWee spoke on “Advances in Functional Encryption,” and Neal Koblitz gave a non-technical lecture on“Cryptography in Vietnam in the French and American Wars.” Theconference also featured a traditional rump session that contained short presentations onthe latest research results of thefield The Program Committee selected the work “FasterFully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds” by IlariaChillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachène for the Best PaperAward of Asiacrypt 2016 Two more papers,“Nonlinear Invariant Attack—PracticalAttack on Full SCREAM, iSCREAM, and Midori64” by Yosuke Todo, Gregor Leander,
Yu Sasaki and “Cliptography: Clipping the Power of Kleptographic Attacks” byAlexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou were solicited to submitfull versions to the Journal of Cryptology
Many people contributed to the success of Asiacrypt 2016 We would like to thankthe authors for submitting their research results to the conference We are very grateful
to all of the Program Committee members as well as the external reviewers for theirfruitful comments and discussions on their areas of expertise We are greatly indebted toNgo Bao Chau and Phan Duong Hieu, the general co-chairs for their efforts and overallorganization We would also like to thank Nguyen Huu Du, Nguyen Quoc Khanh,Nguyen Duy Lan, Duong Ngoc Thai, Nguyen Ta Toan Khoa, Nguyen Ngoc Tuan,
Trang 7Le Thi Lan Anh, and the local Organizing Committee for their continuous supports.
We thank Steven Galbraith for expertly organizing and chairing the rump session.Finally we thank Shai Halevi for letting us use his nice software for supporting thepaper submission and review process We also thank Alfred Hofmann, Anna Kramer,and their colleagues at Springer for handling the editorial process of the proceedings
We would like to express our gratitude to our partners and sponsors: XLIM, MicrosoftResearch, CISCO, Intel, Google
Tsuyoshi Takagi
Trang 8ASIACRYPT 2016
The 22nd Annual International Conference on Theory and Application of Cryptology and Information SecuritySponsored by the International Association for Cryptologic Research (IACR)
December 4–8, 2016, Hanoi, Vietnam
General Co-chairs
Ngo Bao Chau VIASM, Vietnam and University of Chicago, USAPhan Duong Hieu XLIM, University of Limoges, France
Program Co-chairs
Jung Hee Cheon Seoul National University, Korea
Tsuyoshi Takagi Kyushu University, Japan
Program Committee
Elena Andreeva KU Leuven, Belgium
Xavier Boyen Queensland University of Technology, AustraliaAnne Canteaut Inria, France
Chen-Mou Cheng National Taiwan University, Taiwan
Sherman S.M Chow Chinese University of Hong Kong, Hong Kong,
SAR ChinaNico Döttling University of California, Berkeley, USA
Thomas Eisenbarth Worcester Polytechnic Institute, USA
Georg Fuchsbauer École Normale Supérieure, France
Steven Galbraith Auckland University, New Zealand
Sanjam Garg University of California, Berkeley, USA
Vipul Goyal Microsoft Research, India
Jens Groth University College London, UK
Sylvain Guilley Secure-IC S.A.S., France
Alejandro Hevia Universidad de Chile, Chile
Antoine Joux Foundation UPMC and LIP6, France
Xuejia Lai Shanghai Jiaotong University, China
Hyung Tae Lee Nanyang Technological University, SingaporeKwangsu Lee Sejong University, Korea
Dongdai Lin Chinese Academy of Sciences, China
Feng-Hao Liu Florida Atlantic University, USA
Takahiro Matsuda AIST, Japan
Alexander May Ruhr University Bochum, Germany
Trang 9Florian Mendel Graz University of Technology, Austria
Amir Moradi Ruhr University Bochum, Germany
Svetla Nikova KU Leuven, Belgium
Tatsuaki Okamoto NTT, Japan
Elisabeth Oswald University of Bristol, UK
Thomas Peyrin Nanyang Technological University, SingaporeRei Safavi-Naini University of Calgary, Canada
Peter Schwabe Radboud University, The Netherlands
Jae Hong Seo Myongji University, Korea
Damien Stehlé ENS de Lyon, France
Ron Steinfeld Monash University, Australia
Rainer Steinwandt Florida Atlantic University, USA
Daisuke Suzuki Mitsubishi Electric, Japan
Mehdi Tibouchi NTT, Japan
Hoang Viet Tung University of California Santa Barbara, USADominique Unruh University of Tartu, Estonia
Ivan Visconti University of Salerno, Italy
Huaxiong Wang Nanyang Technological University, SingaporeMeiqin Wang Shandong University, China
Céline BlondeauTobias BoelterCarl BootlandJonathan BootleYuri BorissovChristina BouraColin BoydWouter CastryckDario CatalanoAndrea CerulliGizem CetinPyrros ChaidosNishanth ChandranYu-Chen ChangLin ChangluBinyi ChenCong ChenJie Chen
Ming-Shing Chen
Yu Chen
Céline ChevalierChongwon ChoKyu Young ChoiHeeWon ChungKai-Min ChungEloi de ChériseyMichele CiampiCraig CostelloJoan DaemenRicardo DahabWei DaiBernardo DavidThomas de CnuddeDavid DerlerApoorvaa DeshpandeChristoph DobraunigYarkin DorozMing Duan
Léo DucasVIII ASIACRYPT 2016
Trang 10Dung Hoang Duong
Ai IshidaTakanori IsobeTetsu IwataAayush JainSune JakobsenYin JiaShaoquan JiangChethan KamathSabyasachi KaratiSayasachi KaratiYutaka KawaiCarmen KempkaHeeSeok KimHyoseung KimJinsu KimMyungsun KimTaechan KimPaul KirchnerElena KirshanovaFuyuki KitagawaSusumu KiyoshimaJessica KochMarkulf KohlweissVladimir KolesnikovThomas KorakYoshihiro KosekiAshutosh KumarRanjit KumaresanPo-Chun KuoRobert KüblerThijs LaarhovenChing-Yi LaiRussell W.F LaiVirginie LallemandAdeline LangloisSebastian Lauer
Su LeGregor LeanderKwangsu Lee
Gặtan LeurentAnthony LeverrierJingwei LiMing LiWen-Ding Li
Benoit LibertFuchun LinTingting LinMeicheng LiuYunwen LiuZhen LiuZidong LuYiyuan LuoAtul LuykxVadim LyubashevskyBernardo MagriMary MallerAlex MalozemoffAntonio MarcedoneBenjamin MartinDaniel MartinMarco MartinoliDaniel MasnyMaike MassiererMitsuru MatsuiWilli MeierBart MenninkPeihan MiaoKazuhiko MinematsuNicky MouhaPratyay MukherjeeSean Murphy
Jưrn Müller-QuadeValérie NachefMichael NaehrigMatthias NagelYusuke NaitoMridul NandiMaría Naya-PlasenciaKartik NayakKhoa NguyenIvica NikolicVentzislav NikovRyo NishimakiAnca NitulescuKoji NuidaMaciej ObremskiToshihiro OhigashiMiyako OhkuboSumit Kumar PandeyJong Hwan Park
Trang 11Berk SunarKoutarou SuzukiAlan SzepieniecMostafa TahaSomayeh TaheriJunko TakahashiKatsuyuki TakashimaBenjamin TanJean-Pierre TillichJunichi TomidaYiannis TselekounisHimanshu TyagiThomas UnterluggauerDamien VergnaudGilles VillardVanessa VitseDamian VizarMichael WalterHan WangHao WangQiungju WangWei WangYuyu WangYohei WatanabeHoeteck WeeWei WeiMor WeissMario WernerBas Westerbaan
Carolyn WhitnallAlexander WildBaofeng WuKeita XagawaZejun XiangHong XuWeijia XueShota YamadaTakashi YamakawaHailun YanJun YanBo-Yin YangBohan YangGuomin YangMohan YangShang-Yi YangKan YasudaXin YeWentan YiScott YilekKazuki YoneyamaRina ZeitounFan ZhangGuoyan ZhangLiang Feng ZhangLiangfeng ZhangTao ZhangWentao ZhangYusi ZhangZongyang ZhangJingyuan ZhaoYongjun ZhaoYixin ZhongHong-Sheng ZhouXiao ZhouJincheng Zhuang
Local Organizing Committee
Co-chairs
Ngo Bao Chau VIASM, Vietnam and University of Chicago, USAPhan Duong Hieu XLIM, University of Limoges, France
Trang 12Nguyen Huu Du VIASM, Vietnam
Nguyen Quoc Khanh Vietcombank, Vietnam
Nguyen Duy Lan Microsoft Research, USA
Duong Ngoc Thai Google, USA
Nguyen Ta Toan Khoa NTU, Singapore
Nguyen Ngoc Tuan VIASM, Vietnam
Le Thi Lan Anh VIASM, Vietnam
Trang 13Invited Talks
Trang 14Advances in Functional Encryption
of the art, with a focus on constructions based on lattices
CNRS, INRIA and Columbia University Supported in part by ERC Project aSCEND (H2020 639554) and NSF Award CNS-1445424.
Trang 15The Reality of Cryptographic Deployments
on the Internet
Nadia Heninger
University of Pennsylvania, Philadelphia, USA
Abstract.Security proofs for cryptographic primitives and protocols rely on anumber of (often implicit) assumptions about the world in which these compo-nents live They assume that implementations are correct, that specifications arefollowed, that systems make sensible choices about error conditions, and thatreliable sources of random numbers are present However, a number of real worldstudies examining cryptographic deployments have shown that these assump-tions are often not true on a large scale, with catastrophic effects for security
In addition to simple programming errors, many real-world cryptographic nerabilities can be traced back to more complex underlying causes, such asbackwards compatibility, legacy protocols and software, hard-coded resourcelimits, and political interference in design choices
vul-Many of these issues appear on the surface to be at an entirely different level
of abstraction from the cryptographic primitives used in their construction.However, by taking advantage of the structure of many cryptographic primitiveswhen used at Internet scale, it is possible to uncover fundamental vulnerabilities
in implementations I will discuss the interplay between mathematical analysis techniques and the thorny implementation issues that lead to vulnerablecryptographic deployments in the real world
Trang 16crypt-Contents – Part I
Asiacrypt 2016 Best Paper
Faster Fully Homomorphic Encryption: Bootstrapping in Less
Than 0.1 Seconds 3Ilaria Chillotti, Nicolas Gama, Mariya Georgieva,
and Malika Izabachène
Mathematical Analysis I
A General Polynomial Selection Method and New Asymptotic
Complexities for the Tower Number Field Sieve Algorithm 37Palash Sarkar and Shashank Singh
On the Security of Supersingular Isogeny Cryptosystems 63Steven D Galbraith, Christophe Petit, Barak Shani, and Yan Bo Ti
AES and White-Box
Simpira v2: A Family of Efficient Permutations Using the AES
Round Function 95Shay Gueron and Nicky Mouha
Towards Practical Whitebox Cryptography: Optimizing Efficiency
and Space Hardness 126Andrey Bogdanov, Takanori Isobe, and Elmar Tischhauser
Efficient and Provable White-Box Primitives 159Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner,
and Brice Minaud
Hash Function
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
Multiplicative Complexity 191Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy,
and Tyge Tiessen
Balloon Hashing: A Memory-Hard Function Providing Provable Protection
Against Sequential Attacks 220Dan Boneh, Henry Corrigan-Gibbs, and Stuart Schechter
Trang 17Linear Structures: Applications to Cryptanalysis
of Round-Reduced KECCAK 249Jian Guo, Meicheng Liu, and Ling Song
Statistical Fault Attacks on Nonce-Based Authenticated Encryption
Schemes 369Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné,
and Florian Mendel
Authenticated Encryption with Variable Stretch 396Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár
Design Strategies for ARX with Provable Bounds: SPARXand LAX 484Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov,
Johann Großschädl, and Alex Biryukov
SCA and Leakage Resilience I
Side-Channel Analysis Protection and Low-Latency in Action:
– Case Study of PRINCE and Midori – 517Amir Moradi and Tobias Schneider
XVIII Contents– Part I
Trang 18Characterisation and Estimation of the Key Rank Distribution
in the Context of Side Channel Evaluations 548Daniel P Martin, Luke Mather, Elisabeth Oswald, and Martijn Stam
Taylor Expansion of Maximum Likelihood Attacks for Masked
and Shuffled Implementations 573Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul,
François-Xavier Standaert, and Yannick Teglia
Unknown-Input Attacks in the Parallel Setting: Improving the Security
of the CHES 2012 Leakage-Resilient PRF 602Marcel Medwed, François-Xavier Standaert, Ventzislav Nikov,
and Martin Feldhofer
Block Cipher II
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem 627Ivica Nikolić and Yu Sasaki
Applying MILP Method to Searching Integral Distinguishers Based
on Division Property for 6 Lightweight Block Ciphers 648Zejun Xiang, Wentao Zhang, Zhenzhen Bao, and Dongdai Lin
Reverse Cycle Walking and Its Applications 679Sarah Miracle and Scott Yilek
Cryptographic Applications of Capacity Theory: On the Optimality
of Coppersmith’s Method for Univariate Polynomials 759Ted Chinburg, Brett Hemenway, Nadia Heninger, and Zachary Scherr
A Key Recovery Attack on MDPC with CCA Security
Using Decoding Errors 789Qian Guo, Thomas Johansson, and Paul Stankovski
SCA and Leakage Resilience II
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems
Worthwhile—and Why It Is Not 819Cong Chen, Mohammad Farmani, and Thomas Eisenbarth
Contents– Part I XIX
Trang 19Cryptographic Reverse Firewall via Malleable Smooth Projective
Hash Functions 844Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo,
and Mingwu Zhang
Efficient Public-Key Cryptography with Bounded Leakage
and Tamper Resilience 877Antonio Faonio and Daniele Venturi
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage
of Arbitrary Functions 908Eiichiro Fujisaki and Keita Xagawa
Author Index 939
XX Contents– Part I
Trang 20Contents – Part II
Asiacrypt 2016 Award Papers
Nonlinear Invariant Attack: Practical Attack on FullSCREAM,
iSCREAM, and Midori64 3Yosuke Todo, Gregor Leander, and Yu Sasaki
Cliptography: Clipping the Power of Kleptographic Attacks 34Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou
Zero Knowledge
Zero-Knowledge Accumulators and Set Algebra 67Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos,
Roberto Tamassia, and Nikos Triandopoulos
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based
Group Encryption 101Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen,
and Huaxiong Wang
Post Quantum Cryptography
From 5-PassMQ-Based Identification to MQ-Based Signatures 135Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld,
Simona Samardjiska, and Peter Schwabe
Collapse-Binding Quantum Commitments Without Random Oracles 166Dominique Unruh
Digital Signatures Based on the Hardness of Ideal Lattice Problems
in All Rings 196Vadim Lyubashevsky
Trang 21Selective-Opening Security in the Presence of Randomness Failures 278Viet Tung Hoang, Jonathan Katz, Adam O’Neill, and Mohammad Zaheri
Efficient KDM-CCA Secure Public-Key Encryption
for Polynomial Functions 307Shuai Han, Shengli Liu, and Lin Lyu
Structure-Preserving Smooth Projective Hashing 339Olivier Blazy and Céline Chevalier
Digital Signature
Signature Schemes with Efficient Protocols and Dynamic Group Signatures
from Lattice Assumptions 373Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen,
and Huaxiong Wang
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption 404Xavier Boyen and Qinyi Li
From Identification to Signatures, Tightly: A Framework and Generic
Transforms 435Mihir Bellare, Bertram Poettering, and Douglas Stebila
How to Obtain Fully Structure-Preserving (Automorphic) Signatures
from Structure-Preserving Ones 465Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka,
and Keisuke Tanaka
Functional and Homomorphic Cryptography
Multi-key Homomorphic Authenticators 499Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, and Elena Pagnin
Multi-input Functional Encryption with Unbounded-Message Security 531Vipul Goyal, Aayush Jain, and Adam O’Neill
Verifiable Functional Encryption 557Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, and Amit Sahai
ABE and IBE
Dual System Encryption Framework in Prime-Order Groups
via Computational Pair Encodings 591Nuttapong Attrapadung
XXII Contents– Part II
Trang 22Efficient IBE with Tight Reduction to Standard Assumption
in the Multi-challenge Setting 624Junqing Gong, Xiaolei Dong, Jie Chen, and Zhenfu Cao
Déjà Q All Over Again: Tighter and Broader Reductions
of q-Type Assumptions 655Melissa Chase, Mary Maller, and Sarah Meiklejohn
Partitioning via Non-linear Polynomial Functions: More Compact IBEs
from Ideal Lattices and Bilinear Maps 682Shuichi Katsumata and Shota Yamada
Foundation
How to Generate and Use Universal Samplers 715Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai,
Brent Waters, and Mark Zhandry
Iterated Random Oracle: A Universal Approach for Finding Loss
in Security Reduction 745Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai,
and Guomin Yang
NIZKs with an Untrusted CRS: Security in the Face of Parameter
Subversion 777Mihir Bellare, Georg Fuchsbauer, and Alessandra Scafuro
Cryptographic Protocol
Universal Composition with Responsive Environments 807Jan Camenisch, Robert R Enderlein, Stephan Krenn, Ralf Küsters,
and Daniel Rausch
A Shuffle Argument Secure in the Generic Model 841Prastudy Fauzi, Helger Lipmaa, and Michał Zając
Efficient Public-Key Distance Bounding Protocol 873Handan Kılınç and Serge Vaudenay
Indistinguishable Proofs of Work or Knowledge 902Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias,
and Bingsheng Zhang
Multi-party Computation
Size-Hiding Computation for Multiple Parties 937Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka,
and Eiji Okamoto
Contents– Part II XXIII
Trang 23How to Circumvent the Two-Ciphertext Lower Bound for Linear
Garbling Schemes 967Carmen Kempka, Ryo Kikuchi, and Koutarou Suzuki
Constant-Round Asynchronous Multi-Party Computation Based
on One-Way Functions 998Sandro Coretti, Juan Garay, Martin Hirt, and Vassilis Zikas
Reactive Garbling: Foundation, Instantiation, Application 1022Jesper Buus Nielsen and Samuel Ranellucci
Author Index 1053XXIV Contents– Part II
Trang 24Asiacrypt 2016 Best Paper
Trang 25Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
Ilaria Chillotti1(B), Nicolas Gama2,1, Mariya Georgieva3(B),
and Malika Izabach`ene4(B)
1 Laboratoire de Math´ematiques de Versailles, UVSQ, CNRS,
Universit´e Paris-Saclay, 78035 Versailles, France
Abstract In this paper, we revisit fully homomorphic encryption
(FHE) based on GSW and its ring variants We notice that the internalproduct of GSW can be replaced by a simpler external product between
a GSW and an LWE ciphertext
We show that the bootstrapping scheme FHEW of Ducas and ciancio [11] can be expressed only in terms of this external product As
Mic-a result, we obtMic-ain Mic-a speed up from less thMic-an 1 s to less thMic-an 0.1 s Wealso reduce the 1 GB bootstrapping key size to 24 MB, preserving thesame security levels, and we improve the noise propagation overhead byreplacing exact decomposition algorithms with approximate ones
Moreover, our external product allows to explain the unique try in the noise propagation of GSW samples and makes it possible toevaluate deterministic automata homomorphically as in [13] in an effi-cient way with a noise overhead only linear in the length of the testedword
asymme-Finally, we provide an alternative practical analysis of LWE basedscheme, which directly relates the security parameter to the error rate
of LWE and the entropy of the LWE secret key
International Association for Cryptologic Research 2016
J.H Cheon and T Takagi (Eds.): ASIACRYPT 2016, Part I, LNCS 10031, pp 3–33, 2016.
Trang 264 I Chillotti et al.
then, many constructions have appeared involving new mathematical and rithmic concepts and improving efficiency
algo-In homomorphic encryption, messages are encrypted with a noise that grows
at each homomorphic evaluation of an elementary operation In a somewhatencryption scheme, the number of homomorphic operations is limited, but can
be made asymptotically large using bootstrapping [15] This technical trick duced by Gentry allows to evaluate arbitrary circuits by essentially evaluatingthe decryption function on encrypted secret keys This step has remained verycostly until the recent paper of Ducas and Micciancio [11], which presented a
intro-very fast bootstrapping procedure running in around 0.69 s, making an
impor-tant step towards practical FHE for arbitrary NAND circuits In this paper, wefurther improve the bootstrapping procedure
We first provide an intuitive formalization of LWE/RingLWE on numbers orpolynomials over the real torus, obtained by combining the Scale-Invariant-LWEproblem of [9] or the LWE normal form of [10] with the General-LWE problem ofBrakerski-Gentry-Vaikutanathan [5] We call TLWE this unified representation
of LWE ciphertexts, which encode polynomials over the Torus Its security relieseither on the hardness of general or ideal lattice reduction, depending on thechoice of dimensions Using the same formalism, we extend the GSW/RingGSWciphertexts to TGSW, which is the combined analogue of Gentry-Sahai-Water’sciphertexts from [3,16], and which can also instantiate the ring version used inDucas-Micciancio scheme [11] in the FHEW cryptosystem Similarly, a TGSWciphertext encodes an integer polynomial message, and depending on the choice
of dimensions, its security is also based on (worst-case) generic or ideal latticereduction algorithms TLWE and TGSW are basically dual to each other, andthe main idea of our efficiency result comes from the fact that these two schemescan directly be combined together to map the external product of their twomessages into a TLWE sample Since a TGSW sample is essentially a matrixwhose individual rows are TLWE samples, our external product TGSW timesTLWE is much quicker than the usual internal product TGSW times TGSWused in previous work This could mostly be understood as comparing the speed
of the computation of a matrix-vector product to a matrix-matrix product As aresult, we obtain a significant improvement (12 times faster) of the most efficientbootstrapping procedure [11]; it now runs in less than 0.052 s
We also analyze the case of leveled encryption Using an external productmeans that we lose some composability properties in the design of homomorphiccircuits This corresponds to circuits where boolean gates have different kinds ofwires that cannot be freely interconnected Still, we show that we maintain theexpressiveness of the whole binary decision diagram and automata-based logic,which was introduced in [13] with the GSW-GSW internal product, and wetighten the analysis Indeed, while it was impractical (10 transitions per second
in the ring case, and impractical in the non-ring case), we show that the TLWE external product enables to evaluate up to 5000 transitions per second, in
TGSW-a leveled homomorphic mTGSW-anner We TGSW-also refine the mTGSW-apping between TGSW-automTGSW-atTGSW-aand homomorphic gates, and reduce the number of homomorphic operations totest a word with a deterministic automata This allows to compile and evaluate
Trang 27Faster Fully Homomorphic Encryption 5
constant-time algorithms (i.e with data-independent control flow) in a leveledhomomorphic manner, with only sub-linear noise overhead in the running time
We also propose a new security analysis where the security parameter isdirectly expressed as a function of the entropy of the secret and the error rate.For the parameters that we propose in our implementation, we predict 188-bits
of security for both the bootstrapping key and the keyswitching key
Roadmap In Sect.2, we give mathematical definitions and a quick overview ofthe classical version of LWE-based schemes In Sect.3, we generalize LWE and
GSW schemes using a torus representation of the samples We also review the
arithmetic operations over the torus and introduce our main theorem izing the new morphism between TLWE and TGSW As a proof of concept, wepresent two main applications in Sect.4where we explain our fast bootstrappingprocedure, and in Sect.5, we present efficient leveled evaluation of deterministicautomata, and apply it on a constant-time algorithm with logarithmic memory.Finally, we provide a practical security analysis in Sect.6
Notation In the rest of the paper we will use the following notations The
security parameter will be denoted as λ The set {0, 1} (without any structure)
will be writtenB The real Torus R/Z, called T set of real numbers modulo 1 R
denotes the ring of polynomialsZ[X]/(X N+ 1).TN [X] denotes R[X]/(X N+ 1)mod 1 Finally, we note byM p,q (E) the set of matrices p × q with entries in E.
This section combines some algebra theory, namely abelian groups,
commu-tative rings, R-modules, and on some metrics of the continuous fieldR
Definition 2.1 (R-module) Let (R, +, ×) be a commutative ring We say that
a set M is a R-module when (M, +) is an abelian group, and when there exists an external operation · which is bi-distributive and homogeneous Namely, ∀r, s ∈ R and x, y ∈ M, 1 R · x = x, (r + s) · x = r · x + s · x, r · (x + y) = r · x + r · y, and
(r × s) · x = r · (s · x).
Any abelian group is by construction aZ-module for the iteration (or nentiation) of its own law In this paper, one of the most important abeliangroup we use is the real torus T, composed of all reals modulo 1 (R mod 1).The torus is not a ring, since the real internal product is not compatible withthe modulo 1 projection (expressions like 0×1
expo-2 are undefined) But as an tive group, it is aZ-module, and the external product · from Z × T to T, like in
well defined
Trang 286 I Chillotti et al.
Gaussian Distributions Let σ ∈ R+be a parameter and k ≥ 1 the dimension.
For all x, c ∈ R k , we note ρ σ,c (x) = exp(−π x − c2/σ2) If c is omitted,
then it is implicitly 0 Let S be a subset of Rk , ρ σ,c (S) denotes
x ∈S ρ σ,c (x)
or
x ∈S ρ σ,c (x).dx For all closed (continuous or discrete) additive subgroup
M ⊆ R k , then ρ σ,c (M ) is finite, and defines a (restricted) Gaussian Distribution
of parameter σ, standard deviation
2/πσ and center c over M , with the density
functionD M,σ,c (x) = ρ σ,c (x)/ρ σ,c (M ) Let L be a discrete subgroup of M , then the Modular Gaussian distribution over M/L exists and is defined by the density
D M/L,σ,c (x) = D M,σ,c (x + L) Furthermore, when span(M ) = span(L), then M/L admits a uniform distribution of constant density U M/L In this case, the
smoothing parameter η M,ε (L) of L in M is defined as the smallest σ ∈ R such
that supx ∈M |D M/L,σ,c (x) − U M/L | ≤ ε · U M/L If M is omitted, it implicitly
meansRk
Subgaussian Distributions A distribution X over R is σ-subgaussian iff it
satisfies the Laplace-transformation bound: ∀t ∈ R, E(exp(tX)) ≤ exp(σ2t2/2).
By Markov’s inequality, this implies that the tails of X are bounded by the Gaussian function of standard deviation σ: ∀x > 0, P(|X| ≥ x) ≤
2 exp(−x2/2σ2) As an example, the Gaussian distribution of standard
devia-tion σ (i.e parameter
π/2σ), the equi-distribution on {−σ, σ}, and the
uni-form distribution over [− √ 3σ, √
3σ], which all have standard deviation σ, are
σ-subgaussian1 If X and X are two independent σ and σ -subgaussian
vari-ables, then for all α, β ∈ R, αX + βX is
α2σ2+ β2σ -subgaussian
Distance and Norms We use the standard · p and · ∞ norms for scalarsand vectors over the real field or over the integers By extension, the norm
P (X) p of a real or integer polynomial P ∈ R[X] is the norm of its coefficient
vector If the polynomial is modulo X N + 1, we take the norm of its uniquerepresentative of degree≤ N − 1.
By abuse of notation, we writex p= minu∈x+Z k(u p ) for all x ∈ T k It is
the p-norm of the representative of x with all coefficients in ] − 12,12] Although
it satisfies the separation and the triangular inequalities, this notation is not
a norm, because it lacks homogeneity2, and Tk is not a vector space either.But we have∀m ∈ Z, m · x p ≤ |m| x p By extension, we definea p for a
polynomial a ∈ T N [X] as the p- norm of its unique representative in R[X] of
degree≤ N − 1 and with coefficients in ] −1
Trang 29Faster Fully Homomorphic Encryption 7
Definition 2.2 (Infinity norm over M p,q(TN [X])) Let A ∈ M p,q(TN [X]).
We define the infinity norm of A as
A ∞= max
i∈[[1,p]]
j∈[[1,q]]
a i,j ∞
Concentrated Distribution on the Torus, Expectation and Variance
A distribution X on the torus is concentrated iff its support is included in a
ball of radius 1
4 of T, except for negligible probability In this case, we define
the variance Var( X ) and the expectation E(X ) of X as respectively Var(X ) =
minx∈T¯
p(x) |x − ¯x|2 and E(X ) as the position ¯x ∈ T which minimizes this
expression By extension, we say that a distribution X over Tn or TN [X] k isconcentrated iff each coefficient has an independent concentrated distribution
on the torus Then the expectationE(X ) is the vector of expectations of each
coefficient, and Var(X ) denotes the maximum of each coefficient’s Variance.
These expectation and variance overT follow the same linearity rules thantheir classical equivalent over the reals
Fact 2.3 Let X1, X2 be two independent concentrated distributions on either
T, T n orTN [X] k , and e1 , e2∈ Z such that X = e1· X1+ e2 · X2 remains trated, thenE(X ) = e1 ·E(X1)+e2·E(X2) and Var(X ) ≤ e2·Var(X1)+e 2·Var(X2).Also, subgaussian distributions with small enough parameters are necessarilyconcentrated:
concen-Fact 2.4 Every distributionX on either T, T norTN [X] kwhere each coefficient
is σ-subgaussian where σ ≤ 1/32 log(2)(λ + 1) is a concentrated distribution:
a fraction 1− 2 −λ of its mass is in the interval [−1
4,14]
2.1 Learning with Error Problem
The Learning With Errors (LWE) problem was introduced by Regev in 2005 [21].The Ring variant, called RingLWE, was introduced by Lyubashevsky, Peikertand Regev in 2010 [19] Both variants are nowadays extensively used for theconstruction of lattice-based Homomorphic Encryption schemes In the originaldefinition [21], a LWE sample has its right member on the torus and is definedusing continuous Gaussian distributions Here, we will work entirely on the realtorus, employing the same formalism as the Scale Invariant LWE (SILWE) scheme
in [9], or LWE scale-invariant normal form in [10] Without loss of generality, werefer to it as LWE
Definition 2.5 ((Homogeneous) LWE) Let n ≥ 1 be an integer, α ∈ R+ be
a noise parameter and s be a uniformly distributed secret in some bounded set
S ∈ Z n Denote by DLWE
s,α the distribution over Tn × T obtained by sampling a
couple (a, b), where the left member a ∈ T n is chosen uniformly random and the
right member b = a · s + e The error e is a sample from a gaussian distribution
with parameter α.
Trang 308 I Chillotti et al.
– Search problem: given access to polynomially many LWE samples, find s ∈ S.
– Decision problem: distinguish between LWE samples and uniformly random
samples fromTn × T.
Both the LWE search or decision problems are reducible to each other, andtheir average case is asymptotically as hard as worst-case lattice problems Inpractice, both problems are also intractable, and their hardness increases withthe the entropy of the key setS (i.e n if keys are binary) and α ∈]0, η ε(Z)[.Regev’s encryption scheme [21] is the following: Given a discrete messagespace M ∈ T, for instance {0,1
2}, a message μ ∈ M is encrypted by summing
up the trivial LWE sample (0, μ) of μ to a Homogeneous LWE sample (a, b) ∈
Tn+1
with respect to a secret key s ∈ B n and a noise parameter α ∈ R+ Thesemantic security of the scheme is equivalent to the LWE decisional problem The
decryption of a sample c = (a, b) consists in computing this quantity ϕ s (a, b) =
b − s · a, which we call the phase of c, and to round it to the nearest element in
M Decryption is correct with overwhelming probability 1 − 2 −p provided thatthe parameter α is O(R/ √
p) where R is the packing radius of M.
In this section we extend this presentation to rings, following the generalization
of [5], and also to GSW [16]
3.1 TLWE
We first define TLWE samples, together with the search and decision problems
In the following, ciphertexts are viewed as normal samples
Definition 3.1 (TLWE samples) Let k ≥ 1 be an integer, N a power of 2, and α ≥ 0 be a noise parameter A TLWE secret key s ∈ B N [X] k is a vector of k polynomials ∈ R = Z[X]/X N + 1 with binary coefficients For security purposes,
we assume that private keys are uniformly chosen, and that they actually contain
n ≈ Nk bits of entropy The message space of TLWE samples is T N [X] A fresh TLWE sample of a message μ ∈ T N [X] with noise parameter α under the key
s is an element (a, b) ∈ T N [X] k × T N [X], b ∈ T N [X] has Gaussian distribution
DTN [X],α,s • a+μ around μ + s·a The sample is random iff its left member a (also
called mask) is uniformly random ∈ T N [X] k (or a sufficiently dense submodule3),
trivial if a is fixed to 0, noiseless if α = 0, and homogeneous iff its message μ
is 0.
3 A submodule G is sufficiently dense if there exists an intermediate submodule H
such that G ⊆ H ⊆ T n, the relative smoothing parameter η H,ε(G) is ≤ α, and
of at most n − 1 vectors of Z n
This definition allows
to convert any (Ring)-LWE with non-binary secret to a TLWE instance via binarydecomposition
Trang 31Faster Fully Homomorphic Encryption 9
– Search problem: given access to polynomially many fresh random homogeneous
TLWE samples, find their key s ∈ B N [X] k
– Decision problem: distinguish between fresh random homogeneous TLWE ples from uniformly random samples fromTN [X] k+1
sam-This definition is the analogue on the torus of the General-LWE problem
of [5] It allows to consider both LWE and RingLWE as a single problem
Choos-ing N large and k = 1 corresponds to the classical (bin)RChoos-ingLWE (over tomic rings, and up to a scaling factor q) When N = 1 and k large, thenR and
cyclo-TN [X] respectively collapses toZ and T, and TLWE is simply bin-LWE (up to
the same scaling factor q) Other choices of N, k give some continuum between
the two extremes, with a security that varies between worst-case ideal lattices
to worst-case regular lattices
Thanks to the underlyingR-module structure, we can sum TLWE samples,
or we can make integer linear or polynomial combinations of samples with ficients in R However, each of these combinations increases the noise inside thesamples They are therefore limited to small coefficients
coef-We additionally define a function called the phase of a TLWE sample, thatwill be used many times The phase computation is the first step of the classicaldecryption algorithm, and uses the secret key
Definition 3.2 (Phase) Let c = (a, b) ∈ T N [X] k × T N [X] and s ∈ B N [X] k ,
we define the phase of the sample as ϕ s (c) = b − s • a.
The phase is linear over TN [X] k+1 and is (kN + 1)-lipschitzian for the ∞ distance: ∀x, y ∈ T N [X] k+1 , ϕ s (x) − ϕ s (y) ∞ ≤ (kN + 1) x − y ∞
Note that a TLWE sample contains noise, that its semantic is only function ofits phase, and that the phase has the nice property to be lipschitzian Together,these properties have many interesting implications In particular, we can alwayswork with approximations, since two samples at a short distance onTN [X] k+1
share the same properties: they encode the same message, and they can in general
be swapped This fact explains why we can work and describe our algorithms onthe infinite Torus
Given a finite message space M ⊆ T N [X], the (classical) decryption rithm computes the phase ϕ s (c) of the sample, and returns the closest μ ∈ M.
algo-It is easy to see that if c is a fresh TLWE sample of μ ∈ M with gaussian noise parameter α, the decryption of c over M is equal to μ as soon as α is Θ( √
λ)
times smaller than the packing radius of M However decryption is harder to
define for non-fresh samples In this case, correctness of the decryption procedureinvolves a recurrence formula between the decryption of the sum and the sum
of the decryption of the inputs conditioned by the noise parameters In tion, message spaces of the input samples can be in different subgroups of T
addi-To raise the limitations of the decryption function, we will instead use a ematical definition of message and error by reasoning directly on the following
math-Ω-probability space.
Trang 3210 I Chillotti et al.
Definition 3.3 (The Ω-probability space) Since samples are either
inde-pendent (random, noiseless, or trivial) fresh c ← T LW E s,α (μ), or linear
combi-nation ˜ c =p
i=1 e i ·c i of other samples, the probability space Ω is the product of
the probability spaces of each individual fresh samples c with the TLWE
distribu-tions defined in Definition 3.1 , and of the probability spaces of all the coefficients
(e1 , , e p)∈ R p or Zp that are obtained with randomized algorithm.
In other words, instead of viewing a TLWE sample as a fixed value which is
the result of one particular event in Ω, we will consider all the possible values
at once, and make statistics on them
We now define functions on TLWE samples: message, error, noise variance,and noise norm These functions are well defined mathematically, and can beused in the analysis of various algorithms However, they cannot be directlycomputed or approximated in practice
Definition 3.4 Let c be a random variable ∈ T N [X] k+1 , which we’ll interpret
as a TLWE sample All probabilities are on the Ω-space We say that c is a
valid TLWE sample iff there exists a key s ∈ B N [X] k such that the distribution
of the phase ϕ s (c) is concentrated If c is trivial, all keys s are equivalent, else
the mask of c is uniformly random, so s is unique We then define:
– the message of c, denoted as msg(c) ∈ T N [X] is the expectation of ϕ s (c);
– the error, denoted Err(c), is equal to ϕ s (c) − msg(c);
– Var(Err(c)) denotes the variance of Err(c), which is by definition also equal to
the variance of ϕ s (c);
– finally, Err(c) ∞ denotes the maximum amplitude of Err(c) (possibly with
overwhelming probability).
Unlike the classical decryption algorithm, the message function can be viewed
as an ideal black box decryption function, which works with infinite precisioneven if the message space is continuous Provided that the noise amplituderemains smaller than 1
4, the message function is perfectly linear Using theseintuitive and intrinsic functions will considerably ease the analysis of all algo-rithms in this paper In particular, we have:
Fact 3.5 Given p valid and independent TLWE samples c1, , cp under the
same key s, and p integer polynomials e1 , , e p ∈ R, if the linear combination
c =p
i=1 e i c i is a valid TLWE sample, it satisfies: msg(c) =p
i=1 e i msg(c i),
with variance Var(Err(c)) ≤ p
i=1 e i 2 · Var(Err(c i)) and noise amplitude
Err(c) ∞ ≤p
i=1 e i 1· Err(c i) ∞ If the last bound is < 1
4, then c is sarily a valid TLWE sample (under the same key s).
neces-In order to characterize the average case behaviour of our homomorphicoperations, we shall rely on the heuristic assumption of independence below.This heuristic will only be used for practical average-case bounds Our worst-case theorems and lemma based on the infinite norm do not use it at all
Trang 33Faster Fully Homomorphic Encryption 11
Assumption 3.6 (Independence Heuristic) All the coefficients of the error
of TLWE or TGSW samples that occur in all the linear combinations we consider
are independent and concentrated More precisely, they are σ-subgaussian where
σ is the square-root of their variance.
This assumption allows us to bound the variance of the noise instead ofits norm, and to provide realistic average-case bounds which often correspond
to the square root of the worst-case ones The error can easily be proved gaussian, since each coefficients are always obtained by convolving Gaussians
sub-or zero-centered bounded unifsub-orm distributions But the independence tion between all the coefficients remains heuristic Dependencies between coef-ficients may affect the variance of their combinations in both directions Theindependence of coefficients can be obtained by adding enough entropy in allour decomposition algorithms and by increasing some parameters accordingly,but as noticed in [11], this work-around seems more as a proof artefact, and
assump-is experimentally not needed Since average case corollaries should reflect tical results, we leave the independence of subgaussian samples as a heuristicassumption
Definition 3.7 (Approximate Gadget Decomposition) Let h ∈ M p,k+1
(TN [X]) as in ( 1 ) We say that Dec h,β, (v) is a decomposition algorithm on
the gadget h with quality β and precision if and only if for any TLWE sample
v ∈ T N [X] k+1 , it efficiently and publicly outputs a small vector u ∈ R (k+1) such that u ∞ ≤ β and u · h − v ∞ ≤ Furthermore, the expectation of u · h − v must to be 0 when v is uniformly distributed in T N [X] k+1
Definition3.7 is generic, but in the rest of the paper, we will only use thisfixed gadget:
1/B
g 0
Trang 3412 I Chillotti et al.
The matrix h consists in a diagonal of columns, each containing a
super-increasing sequence of constant polynomials in T Algorithm 1 represents an
efficient decomposition of TLWE samples on h, and the following lemma proves
its correctness In theory, decomposition algorithms should be randomized toguarantee that the distribution of all error coefficients remain independent Inpractice, we already rely on Heuristic 3.6 We just need that the expectation ofthe small errors induced by the approximations remains null, so that the message
is not changed
Lemma 3.8 Let ∈ N and B g ∈ N Then for β = B g /2 and = 1/2B
g , Algorithm 1 is a valid Dec h,β,
Algorithm 1 Gadget Decomposition of a TLWE sample
6: Return (e i,p)i,p
Proof Let v = (a, b) = (a1, , a k , b = a k+1)∈ T N [X] k+1 be a TLWE sample,given as input to Algorithm1 Let u = [e1,1 , , e k+1,]∈ R (k+1) be the corre-sponding output by constructionu ∞ ≤ B g /2 = β.
Let dec = u · h − v For all i ∈ [[1, k + 1]] and j ∈ [[1, ]], we have by struction deci,j =
has therefore a concentrated distribution when v is uniform We now verify that
it is zero-centered Finally, if we call f the function from T to T which rounds
an element x to its closest multiple of B1
g and the function g the symmetry defined by g(x) = 2f (x) − x on the torus; we easily verify that the E(deci,j)
is equal to E(a i,j − f(a i,j )) when a i,j has uniform distribution, which is equal
to E(g(a i,j)− f(g(a i,j ))) when g(a i,j) has uniform distribution also equal to
E(f(a i,j)− a i,j) =−E(deci,j ) Thus, the expectation of decis 0
We are now ready to define TGSW samples, and to extend the notions ofphase of valid sample, message and error of the samples
Definition 3.9 (TGSW samples) Let and k ≥ 1 be two integers, α ≥ 0
be a noise parameter and h the gadget defined in Eq (1) Let s ∈ B N [X] k
Trang 35Faster Fully Homomorphic Encryption 13
be a RingLWE key, we say that C ∈ M (k+1),k+1(TN [X]) is a fresh TGSW
sample of μ ∈ R/h ⊥ with noise parameter α iff C = Z + μ • h where
each row of Z ∈ M (k+1),k+1(T N [X]) is an Homogeneous TLWE sample (of
0) with Gaussian noise parameter α Reciprocally, we say that an element
C ∈ M (k+1),k+1(TN [X]) is a valid TGSW sample iff there exists a unique
polynomial μ ∈ R/h ⊥ and a unique key s such that each row of C − μ • h is a
valid TLWE sample of 0 for the key s We call the polynomial μ the message of
C, and we denote it by msg(C).
Definition 3.10 (Phase, Error) Let A = ∈ M (k+1),k+1(TN [X]) be a TGSW
sample for a secret key s ∈ B N [X] k and noise parameter α ≥ 0.
We define the phase of A, denoted as ϕ s (A) ∈ (T N [X]) (k+1) , as the list of the (k + 1) TLWE phases of each line of A In the same way, we define the error of A, denoted Err(A), as the list of the (k + 1) TLWE errors of each line
of A.
Since TGSW samples are essentially vectors of TLWE samples, they are urally compatible with linear operations And both phase and message functionsremain linear
nat-Fact 3.11 Given p valid TGSW samples C1, , C p of messages μ1, , μ p
under the same key, and with independent error coefficients, and given p integer polynomials e1 , , e p , the linear combination C =p
i=1 e i 1· Err(C) ∞
Also, the phase remains 1 + kN lipschitzian for the infinity norm.
Fact 3.12 For all A ∈ M p,k+1(TN [X]), ϕ s (A) ∞ ≤ (Nk + 1) A ∞
We finally define the homomorphic product between TGSW and TLWE ples, whose corresponding message is simply the product of the two messages ofthe initial samples Since the left member encodes an integer polynomial, andthe right one a torus polynomial, this operator performs a homomorphic evalu-ation of their external product Theorem3.14(resp Corollary3.15) analyzes theworst-case (resp average-case) noise propagation of this product Then, Corol-lary3.16 relates this new morphism to the classical internal product betweenTGSW samples
sam-Definition 3.13 (External product) We define the product as
: TGSW × TLWE −→ TLWE
(A, b) −→ A b = Dec h,β, (b) · A.
The formula is almost identical to the classical product defined in the originalGSW scheme in [16], except that only one vector needs to be decomposed Forthis reason, we get almost the same noise propagation formula, with an additionalterm that comes from the approximations in the decomposition
Trang 3614 I Chillotti et al.
Theorem 3.14 (Worst-case External Product) Let A be a valid TGSW
sample of message μ A and let b be a valid TLWE sample of message μ b Then A b is a TLWE sample of message μ A · μ b and Err(A b) ∞ ≤
(k + 1)N β Err(A) ∞ + μ A 1(1 + kN ) + μ A 1Err(b) ∞ (worst case), where β and are the parameters used in the decomposition Dec h,β, (b) If
Err(A b) ∞ ≤ 1/4 we are guaranteed that A b is a valid TLWE sample.
Proof As A = TGSW(μ A ), then by definition it is equal to A = Z A + μ A · h,
where Z A is a TGSW encryption of 0 and h is the gadget matrix In the same way, as b = TLWE(μ b ), then by definition it is equal to b = z b + (0, μ b), where
z b is a TLWE encryption of 0 Let
Then the phase (linear function) of A b is
ϕ s (A b) = u · Err(A) + μ A · ϕ s ( dec ) + μ A · Err(b) + μ A μ b
Taking the expectation, we get that msg(A b) = 0 + 0 + 0 + μ A μ b, and so
Err(A b) = ϕ s (A b) − μ A μ b Then thanks to Fact3.12, we have
Err(A b) ∞ ≤ u · Err(A) ∞+μ A · ϕ( dec) ∞+μ A · Err(b) ∞
≤ (k + 1)Nβη A+μ A 1(1 + kN ) dec ∞+μ A 1η b
We similarly obtain the more realistic average-case noise propagation, based
on the independence heuristic, by bounding the Gaussian variance instead of theamplitude
Corollary 3.15 (Average-case External Product) Under the same
con-ditions of Theorem 3.14 and by assuming the Heuristic 3.6 , we have that
Var(Err(Ab)) ≤ (k+1)Nβ2Var(Err(A))+(1+kN) μ A 2
2+μ A 2Var(Err(b)).
Trang 37Faster Fully Homomorphic Encryption 15
Proof Let ϑ A = Var(Err(A)) = Var(ϕ s (Z A )) and ϑ b = Var(Err(b)) =
Var(ϕ s (z b)) By using the same notations as in the proof of Theorem3.14 we
have that the error of A b is Err(Ab) = u·Err(A)+μ A ·ϕ s ( dec ) + μ A ·Err(b)
and thanks to Assumption3.6and Fact3.12, we have:
Var(Err(A b)) ≤ Var(u · Err(A))) + Var(μ A · ϕ( dec )) + Var(μ A · Err(b))
As we mentioned before, it is much slower to evaluate, because it consists in
(k + 1) independent computations of the product, which we illustrate now
Corollary 3.16 (Internal Product) Let the product
⎤
⎥
⎦ ,
with A and B two valid TGSW samples of messages μ A and μ B respectively
and b i corresponding to the i-th line of B Then A B is a TGSW sample of
message μ A ·μ B and Err(A B) ∞ ≤ (k+1)Nβ Err(A) ∞+μ A 1(1+kN )+
μ A 1Err(B) ∞ (worst case) If Err(A B) ∞ ≤ 1/4 we are guaranteed that
A B is a valid TGSW sample.
Furthermore, by assuming the Heuristic 3.6 , we have that Var(Err(A B)) ≤
(k + 1)N β2Var(Err(A)) + (1 + kN)(μ A )2+ μ2A Var(Err(b)) (average case).
Proof Let A and B be two TGSW samples, and μ A and μ B their message
By definition, the i-th row of B encodes μ B • h i , so the i-th row of A B encodes (μ A μ B)• h i This proves that A B encodes μ A μ B Since the internal
product A B consists in (k + 1) independent runs of the external products
A b i, the noise propagation formula directly follows from Theorem3.14 and
In the next section, we show that all internal products in the bootstrappingprocedure can be replaced with the external one Consequently, we expect a
speed-up of a factor at least (k + 1)
Than 0.1 Seconds
In this section, we show how to use Theorem3.14to speed-up the bootstrappingpresented in [11] With additional optimizations, we drastically reduce the boot-strapping key size, and also reduce a bit the noise overhead To bootstrap a LWE
Trang 3816 I Chillotti et al.
sample (a, b) ∈ T n+1, which is rescaled as (¯a, ¯b) mod 2N , using relevant tions of its secret key s ∈ B n, the overall idea is the following We start from afixed polynomial testv∈ T N [X], which is our phase detector: its i-th coefficient
encryp-is set to the value that the bootstrapping should return if ϕ s (a, b) = i/2N testv
is first encoded in a trivial LWE sample Then, we iteratively rotate its ficients, using external multiplications with TGSW encryptions of the hidden
coef-monomials X −s i¯i By doing so, the original testv gets rotated by the (hidden)
phase of (a, b), and in the end, we simply extract the constant term as a LWE
sample
4.1 TLWE to LWE Extraction
Like in previous work, extracting a LWE sample from a TLWE sample simplymeans rewriting polynomials into their list of coefficients, and discarding the
N − 1 last coefficients of b This yields a LWE encryption of the constant term
of the initial polynomial message
Definition 4.1 (TLWE Extraction) Let (a , b ) be a TLWE s (μ)
sam-ple with key s ∈ R k , We call KeyExtract(s ) the integer vector s =
(coefs(s 1(X), , coefs(s k (X)) ∈ Z kN and SampleExtract(a , b ) the LWE
sam-ple (a , b )∈ T kN +1 where a = (coefs(a 1(1/X), , coefs(a k (1/X)) and b = b 0
the constant term of b Then ϕ s (a , b ) (resp msg(a , b )) is equal to the
con-stant term of ϕ s (a , b ) (resp to the constant term of μ = msg(a , b )) And
Err(a , b ) ∞ ≤ Err(a , b ) ∞ and Var(Err(a , b ))≤ Var(Err(a , b )).
4.2 LWE to LWE Key-Switching Procedure
Given a LWEs sample of a message μ ∈ T, the key switching procedure
ini-tially proposed in [5,7] outputs a LWEs sample of the same μ without increasing
the noise too much Contrary to previous exact keyswitch procedures, here wetolerate approximations
Definition 4.2 Let s ∈ {0, 1} n , s ∈ {0, 1} n , a noise parameter γ ∈ R and a precision parameter t ∈ N, we call key switching secret KS s →s,γ,t a sequence of
fresh LWE samples KS i,j ∈ LWE s,γ (s i · 2 −j ) for i ∈ [1, n ] and j ∈ [1, t].
Lemma 4.3 (Key switching) Given (a , b )∈ LWE s (μ) where s ∈ {0, 1} n with noise η = Err(a , b ) ∞ and a keyswitching key KSs →s,γ,t , where s ∈
{0, 1} n , the key switching procedure outputs a LWE sample (a, b) ∈ LWE s n (μ)
where Err(a, b) ∞ ≤ η + n tγ + n 2−(t+1) .
Trang 39Faster Fully Homomorphic Encryption 17
Algorithm 2 KeySwitch procedure
1, , a
where s ∈ {0, 1} n
, s ∈ {0, 1} nandt ∈ N a precision parameter
The expectation of the left side of the equality is equal to msg(a, b) For the
right side, each a i,jis uniformly distributed in{0, 1} and (a
i −¯a
i) is a 0-centered
variable so the expectation of the sum is 0 Thus, msg(a, b) = msg(a , b ) Weobtain ϕ s (a, b) − msg(a, b) ∞ ≤ η + n · t · γ + n 2−(t+1).
Corollary 4.4 Let t be an integer parameter Under Assumption 3.6 Given
(a , b )∈ LWE s (μ) with noise variance η = Var(Err(a , b )) and a key switching
key KSs →s,γ, , the key switching procedure outputs an LWE sample (a , b ) ∈
LWEs (μ) where Var(Err(a, b)) ≤ η + n · t · γ2+ n 2−2(t+1)
4.3 Bootstrapping Procedure
Given a LWE sample LWEs (μ) = (a, b), the bootstrapping procedure constructs
an encryption of μ under the same key s but with a fixed amount of noise As
in [11], we will use TLWE as an intermediate encryption scheme to perform ahomomorphic evaluation of the phase but here we will use its external productfrom Theorem3.14with a TGSW encryption of the key s.
Definition 4.5 Let s ∈ B n , s ∈ B N [X] k and α be a noise parameter We define the bootstrapping key BK s→s ,α as the sequence of n TGSW samples where BK i ∈ TGSW s ,α (s i ).
Trang 4018 I Chillotti et al.
Algorithm 3 Bootstrapping procedure
keyKSs →s,γ where s =KeyExtract(s ), two fixed messagesμ0, μ1∈ T
;μ1 else
1: Let ¯μ = μ1+μ0
8: Return KeySwitchKS(u)
We first provide a comparison between the bootstrapping of Algorithm3
and [11, Algorithms 1 and 2] proposal
– Like [11], we rescale the computation of the phase of the input LWE sample
so that it is modulo 2N (line 2) and we map all the corresponding operations
in the multiplicative cyclic group{1, X, , X 2N −1 } Since our LWE samples
are described over the real torus, the rescaling is done explicitly in line 2.This rescaling may induce a cumulated rounding error of amplitude at most
δ ≈ √ n/4N in the average case and δ ≤ (n + 1)/4N in the worst case In
the best case, this amplitude can decrease to zero (δ = 0) if in the actual
representation of LWE samples, all the coefficients are restricted to multiple
of 2N1 , which would be the analogue of [11]’s setting
– As in [11], messages are encoded as roots of unity inR Our accumulator is
a TLWE sample instead of a TGSW sample in [11] Also accumulator tions use the external product from Theorem3.14instead of the slower classi-
opera-cal internal product The test vector (1+X+ +X N −1) is embedded in the
accumulator from the very start, when the accumulator is still noiseless while
in [11], it is added at the very end This removes a factor √
decom-to this squashing technique, two accumuladecom-tor operations were performed periteration instead of one in our case This gives us an additional 2X speed up
Theorem 4.6 (Bootstrapping Theorem) Let h ∈ M (k+1),k+1(TN [X]) be
the gadget defined in Eq 1 and let Dec h,,β be the associated vector gadget position function.