Title: Oded Regev
1On Lattices, Learning with Errors, Random
Linear Codes, and Cryptography
Oded Regev Tel-Aviv University
2Outline
3Lattices
- Basis
- v1,,vn vectors in Rn
- The lattice L is
- La1v1anvn ai integers
-
- The dual lattice of L is
- Lx 8 y2L, hx,yi 2 Z
-
v1v2
2v2
2v1
2v2-v1
v1
v2
2v2-2v1
0
4Shortest Vector Problem (SVP)
- SVP Given a lattice, find an approximately
shortest vector
v2
v1
0
5Closest Vector Problem (CVPd)
- CVPd Given a lattice and a target vector within
distance d, find the closest lattice point
0
6Main TheoremHardness of Learning
7Learning from parity with error
8Learning from parity with error
9Learning modulo p
10Learning modulo p
11Main Theorem
12Equivalent formulation
13Why Quantum?
14Why Quantum?
x
y
15ApplicationNew Public Key Encryption Scheme
16Previous lattice-based PKESAjtaiDwork96,Goldreic
hGoldwasserHalevi97,R03
17Ajtais recent PKES Ajtai05
18New lattice-based PKESThis work
19The Cryptosystem
21 02 10 23 1 11 22 20 33
2 01 22 00 33 1 11 22 00 23
0 01 32 10 33 3 31 32 00
23 2
2 0 1 2 1 2 2 3 0 2
0 3 1 2 0 2 0 3 1
3 3 3 0 2
2? 0? 1? 2? 1 1? 2? 2? 3?
2 0? 2? 0? 3? 1 1? 2? 0? 2?
0 0? 3? 1? 3? 3 3? 3? 0?
2? 2
21 02 10 23 0 11 22 20 33
2 01 22 00 33 1 11 22 00 23
3 01 32 10 33 3 31 32 00
23 3
3? 2? 1? 0? 3
20Proof of the Main TheoremOverview
21Gaussian Distribution
22The Reduction
23Dr
24Dr/2
25Obtaining Dr/2 from Dr
p2vn
26Classical, uses learning oracle Quantum
Samples from Dr in L
Solution to CVPp/r in L
Samples from Dr/2 in L
Solution to CVP2p/r in L
Samples from Dr/4 in L
Solution to CVP4p/r in L
27Fourier Transform
Primal world (L)
Dual world (L)
28Fourier Transform
29Proof of the Main TheoremLemma 2 Obtaining
Dvn/d from CVPd
30From CVPd to Dvn/d
31From CVPd to Dvn/d
32From CVPd to Dvn/d
33Proof of the Main TheoremLemma 1 Solving
CVPp/r given samples from Dr and an oracle for
learning mod p
34Its enough to approximate fp/r
35Whats ahead in this part
36Warm-up approximating f1/r
37(No Transcript)
38Fourier Transform
39Approximating f2/r
40Approximating f2/r
41(No Transcript)
42(No Transcript)
43Approximating f2/r
44Approximating f2/r
hs,t1i ¼dhx,w1ic mod 2 hs,t2i ¼dhx,w2ic mod
2 hs,t3i ¼dhx,w3ic mod 2 . . .
45Approximating f2/r
46Open Problems 1/4
47Open Problems 2/4
48Open Problems 3/4
- Cryptanalysis
- Current attacks limited to low dimension
NguyenStern98 - New systems Ajtai05,R05 are efficient and can
be easily used with dimension 100 - Security against chosen-ciphertext attacks
- Known lattice-based cryptosystems are not secure
against CCA
49Open Problems 4/4
- Comparison with number theoretic cryptography
- E.g., can one factor integers using an oracle for
n-approximate SVP? - Signature schemes
- Can one construct provably secure lattice-based
signature schemes?