Peculiar Properties of Lattice-Based Encryption Chris Peikert - - PowerPoint PPT Presentation

peculiar properties of lattice based encryption chris
SMART_READER_LITE
LIVE PREVIEW

Peculiar Properties of Lattice-Based Encryption Chris Peikert - - PowerPoint PPT Presentation

Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology Public Key Cryptography and the Geometry of Numbers 7 May 2010 1 / 19 Talk Agenda Encryption schemes with special features: 2 / 19 Talk Agenda


slide-1
SLIDE 1

Peculiar Properties of Lattice-Based Encryption Chris Peikert

Georgia Institute of Technology Public Key Cryptography and the Geometry of Numbers 7 May 2010

1 / 19

slide-2
SLIDE 2

Talk Agenda

Encryption schemes with special features:

2 / 19

slide-3
SLIDE 3

Talk Agenda

Encryption schemes with special features:

1 “(Bi-)Deniability”

2 / 19

slide-4
SLIDE 4

Talk Agenda

Encryption schemes with special features:

1 “(Bi-)Deniability” 2 “Circular” Security

2 / 19

slide-5
SLIDE 5

Part 1: Deniable Encryption

◮ A. O’Neill, C. Peikert (2010) “Bideniable Public-Key Encryption”

3 / 19

slide-6
SLIDE 6

Deniable Encryption

c = Encpk(“surprise party 4 big bro!”)

(Images courtesy xkcd.org) 4 / 19

slide-7
SLIDE 7

Deniable Encryption

c = Encpk(“surprise party 4 big bro!”) !!

(Images courtesy xkcd.org) 4 / 19

slide-8
SLIDE 8

Deniable Encryption

c = DenEncpk(“surprise party 4 big bro!”)

(Images courtesy xkcd.org)

What We Want

1 Bob gets Alice’s intended message, but . . .

4 / 19

slide-9
SLIDE 9

Deniable Encryption

(fake!) (fake!)

c = DenEncpk(“surprise party 4 big bro!”)

(Images courtesy xkcd.org)

What We Want

1 Bob gets Alice’s intended message, but . . .

4 / 19

slide-10
SLIDE 10

Deniable Encryption

c = Encpk(“I love kittens!!!!”)

(Images courtesy xkcd.org)

What We Want

1 Bob gets Alice’s intended message, but . . . 2 Fake coins & keys ‘look as if’ another message was encrypted!

4 / 19

slide-11
SLIDE 11

Applications of Deniability

1 Anti-coercion: ‘off the record’ communication (journalists, lawyers,

whistle-blowers), 1984

5 / 19

slide-12
SLIDE 12

Applications of Deniability

1 Anti-coercion: ‘off the record’ communication (journalists, lawyers,

whistle-blowers), 1984

2 Voting: can reveal any candidate, so can’t ‘sell’ vote (?)

5 / 19

slide-13
SLIDE 13

Applications of Deniability

1 Anti-coercion: ‘off the record’ communication (journalists, lawyers,

whistle-blowers), 1984

2 Voting: can reveal any candidate, so can’t ‘sell’ vote (?) 3 Secure protocols tolerating adaptive break-ins [CFGN’96]

5 / 19

slide-14
SLIDE 14

State of the Art

Theory [CanettiDworkNaorOstrovsky’97] ◮ Sender-deniable encryption scheme ◮ Receiver-deniability by adding interaction & switching roles ◮ Bi-deniability by interaction w/ 3rd parties (one must remain uncoerced)

6 / 19

slide-15
SLIDE 15

State of the Art

Theory [CanettiDworkNaorOstrovsky’97] ◮ Sender-deniable encryption scheme ◮ Receiver-deniability by adding interaction & switching roles ◮ Bi-deniability by interaction w/ 3rd parties (one must remain uncoerced) Practice: TrueCrypt, Rubberhose, . . . ◮ Limited deniability: “move along, no message here. . . ” Plausible for storage, but not so much for communication.

6 / 19

slide-16
SLIDE 16

This Work

1 Bi-deniable encryption: sender & receiver simultaneously

coercible

7 / 19

slide-17
SLIDE 17

This Work

1 Bi-deniable encryption: sender & receiver simultaneously

coercible

⋆ A true public-key scheme: non-interactive, no 3rd parties ⋆ Uses special properties of lattices [Ajtai’96,Regev’05,GPV’08,. . . ] ⋆ Has large keys . . . but this is inherent [Nielsen’02] 7 / 19

slide-18
SLIDE 18

This Work

1 Bi-deniable encryption: sender & receiver simultaneously

coercible

⋆ A true public-key scheme: non-interactive, no 3rd parties ⋆ Uses special properties of lattices [Ajtai’96,Regev’05,GPV’08,. . . ] ⋆ Has large keys . . . but this is inherent [Nielsen’02]

2 “Plan-ahead” bi-deniability with short keys

⋆ Bounded number of alternative messages, decided in advance 7 / 19

slide-19
SLIDE 19

A Core Tool: Translucent Sets

[CDNO’97]

{0, 1}k = U P Public description pk with secret ‘trapdoor’ sk.

8 / 19

slide-20
SLIDE 20

A Core Tool: Translucent Sets

[CDNO’97]

{0, 1}k = U P x Public description pk with secret ‘trapdoor’ sk. Properties

1 Given only pk,

⋆ Can efficiently sample from P (and from U, trivially). ⋆ P-sample is pseudorandom: ‘looks like’ a U-sample. . . ⋆ . . . so it can be ‘faked’ as a U-sample. 8 / 19

slide-21
SLIDE 21

A Core Tool: Translucent Sets

[CDNO’97]

{0, 1}k = U P x Public description pk with secret ‘trapdoor’ sk. Properties

1 Given only pk,

⋆ Can efficiently sample from P (and from U, trivially). ⋆ P-sample is pseudorandom: ‘looks like’ a U-sample. . . ⋆ . . . so it can be ‘faked’ as a U-sample.

2 Given sk, can easily distinguish P from U.

8 / 19

slide-22
SLIDE 22

A Core Tool: Translucent Sets

[CDNO’97]

{0, 1}k = U P x Public description pk with secret ‘trapdoor’ sk. Properties

1 Given only pk,

⋆ Can efficiently sample from P (and from U, trivially). ⋆ P-sample is pseudorandom: ‘looks like’ a U-sample. . . ⋆ . . . so it can be ‘faked’ as a U-sample.

2 Given sk, can easily distinguish P from U.

◮ Many instantiations: trapdoor perms (RSA), DDH, lattices, . . .

8 / 19

slide-23
SLIDE 23

Translucence for Deniability

[CDNO’97]

U P sk Normal: Enc(0) = UU Enc(1) = UP

9 / 19

slide-24
SLIDE 24

Translucence for Deniability

[CDNO’97]

U P sk Normal: Enc(0) = UU Enc(1) = UP Deniable: Enc(0) = PP Enc(1) = UP

9 / 19

slide-25
SLIDE 25

Translucence for Deniability

[CDNO’97]

U P sk Normal: Enc(0) = UU Enc(1) = UP Deniable: Enc(0) = PP Enc(1) = UP Deniability ✔ Alice can fake: PP → UP → UU

9 / 19

slide-26
SLIDE 26

Translucence for Deniability

[CDNO’97]

U P sk Normal: Enc(0) = UU Enc(1) = UP Deniable: Enc(0) = PP Enc(1) = UP

Deniability ✔ Alice can fake: PP → UP → UU ✗ What about Bob?? His sk reveals the true nature of the samples!

9 / 19

slide-27
SLIDE 27

Our Contribution: Bi-Translucent Sets

Properties

1 Each pk has many sk, each inducing a slightly different P-test.

10 / 19

slide-28
SLIDE 28

Our Contribution: Bi-Translucent Sets

Properties

1 Each pk has many sk, each inducing a slightly different P-test.

10 / 19

slide-29
SLIDE 29

Our Contribution: Bi-Translucent Sets

x Properties

1 Each pk has many sk, each inducing a slightly different P-test. 2 Most sk classify a given P-sample correctly.

10 / 19

slide-30
SLIDE 30

Our Contribution: Bi-Translucent Sets

x Properties

1 Each pk has many sk, each inducing a slightly different P-test. 2 Most sk classify a given P-sample correctly. 3 Can generate pk with a faking key: given fk and a P-sample x,

can find a ‘proper-looking’ sk that classifies x as a U-sample.

10 / 19

slide-31
SLIDE 31

Our Contribution: Bi-Translucent Sets

x Properties

1 Each pk has many sk, each inducing a slightly different P-test. 2 Most sk classify a given P-sample correctly. 3 Can generate pk with a faking key: given fk and a P-sample x,

can find a ‘proper-looking’ sk that classifies x as a U-sample. ⇒ Bob can also fake P → U!

10 / 19

slide-32
SLIDE 32

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A)

O

r

O

Basic Translucency ◮ pk = parity check A of lattice L⊥(A). ◮ sk = Gaussian (short) vector r ∈ L⊥.

(I.e., Ar = 0 ∈ Zn

q.) 11 / 19

slide-33
SLIDE 33

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A)

O

r

O

x Basic Translucency ◮ pk = parity check A of lattice L⊥(A). ◮ sk = Gaussian (short) vector r ∈ L⊥.

(I.e., Ar = 0 ∈ Zn

q.)

◮ U-sample = uniform x in Zm

q . Then r, x is uniform mod q.

11 / 19

slide-34
SLIDE 34

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A)

O

r

O

x Basic Translucency ◮ pk = parity check A of lattice L⊥(A). ◮ sk = Gaussian (short) vector r ∈ L⊥.

(I.e., Ar = 0 ∈ Zn

q.)

◮ U-sample = uniform x in Zm

q . Then r, x is uniform mod q.

◮ P-sample = x = Ats + e (LWE). Then r, x ≈ 0 mod q.

11 / 19

slide-35
SLIDE 35

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A)

O

fk

O

x Receiver Faking ◮ Faking key = short basis of L⊥

(a la [GPV’08,. . . ])

11 / 19

slide-36
SLIDE 36

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A) r

O

fk

O

x Receiver Faking ◮ Faking key = short basis of L⊥

(a la [GPV’08,. . . ])

◮ Given P-sample x, choose fake r ∈ L⊥ correlated with x’s error. Then r, x is uniform mod q ⇒ x is classified as a U-sample.

11 / 19

slide-37
SLIDE 37

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A) r

O

fk

O

x Security (in a nutshell) ◮ Fake r depends heavily on x. Why would it ‘look like’ a ‘normal’ r?

11 / 19

slide-38
SLIDE 38

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A) r

O O

x Security (in a nutshell) ◮ Fake r depends heavily on x. Why would it ‘look like’ a ‘normal’ r? ◮ Alternative experiment: choose Gaussian r (as normal), then let x = LWE + Gauss · r. This (r, x) has the same∗ joint distrib!

11 / 19

slide-39
SLIDE 39

Lattice-Based Bi-Translucent Set

Primal L⊥(A) Dual L(A) r

O O

x Security (in a nutshell) ◮ Fake r depends heavily on x. Why would it ‘look like’ a ‘normal’ r? ◮ Alternative experiment: choose Gaussian r (as normal), then let x = LWE + Gauss · r. This (r, x) has the same∗ joint distrib! ◮ Finally, replace LWE with uniform ⇒ normal r and U-sample x.

11 / 19

slide-40
SLIDE 40

Closing Thoughts on Deniability

◮ Faking sk requires ‘oblivious’ misclassification (of P as U) ◮ Bi-deniability from other cryptographic assumptions? ◮ Full deniability, without alternative algorithms?

12 / 19

slide-41
SLIDE 41

Part 2: Circular-Secure Encryption

◮ B. Applebaum, D. Cash, C. Peikert, A. Sahai (CRYPTO 2009) “Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems”

13 / 19

slide-42
SLIDE 42

Circular / “Clique” / Key-Dependent Security

skAlice EncpkBob(skAlice) ✔ skBob

14 / 19

slide-43
SLIDE 43

Circular / “Clique” / Key-Dependent Security

skAlice EncpkBob(skAlice) ✔ EncpkAlice(skBob) ?? skBob ◮ “Semantic security” [GM’02] only guarantees security for messages that the adversary can itself generate.

14 / 19

slide-44
SLIDE 44

Circular / “Clique” / Key-Dependent Security

skAlice EncpkBob(skAlice) ✔ EncpkAlice(skBob) ?? skBob ◮ “Semantic security” [GM’02] only guarantees security for messages that the adversary can itself generate.

⋆ F-KDM security: adversary also gets Encpk(f(sk)) for any f ∈ F ⋆ Clique security: adversary gets Encpki(f(skj)) for any i, j 14 / 19

slide-45
SLIDE 45

Circular / “Clique” / Key-Dependent Security

skAlice EncpkBob(skAlice) ✔ EncpkAlice(skBob) ?? skBob ◮ “Semantic security” [GM’02] only guarantees security for messages that the adversary can itself generate.

⋆ F-KDM security: adversary also gets Encpk(f(sk)) for any f ∈ F ⋆ Clique security: adversary gets Encpki(f(skj)) for any i, j

◮ Applications: formal analysis [ABHS’05], disk encryption, anonymity systems [CL

’01], fully homomorphic encryption [G’09]

14 / 19

slide-46
SLIDE 46

Circular / “Clique” / Key-Dependent Security

skAlice EncpkBob(skAlice) ✔ EncpkAlice(skBob) ?? skBob ◮ “Semantic security” [GM’02] only guarantees security for messages that the adversary can itself generate.

⋆ F-KDM security: adversary also gets Encpk(f(sk)) for any f ∈ F ⋆ Clique security: adversary gets Encpki(f(skj)) for any i, j

◮ Applications: formal analysis [ABHS’05], disk encryption, anonymity systems [CL

’01], fully homomorphic encryption [G’09]

◮ Some (semantically secure) schemes are actually circular-insecure [ABBC’10,GH’10]

14 / 19

slide-47
SLIDE 47

Solutions

[Boneh-Halevi-Hamburg-Ostrovsky’08]

◮ Based on decisional Diffie-Hellman (DDH) assumption

15 / 19

slide-48
SLIDE 48

Solutions

[Boneh-Halevi-Hamburg-Ostrovsky’08]

◮ Based on decisional Diffie-Hellman (DDH) assumption Our Scheme [Applebaum-Cash-P-Sahai’09] ◮ Based on Learning With Errors (LWE) assumption [Regev’05]

15 / 19

slide-49
SLIDE 49

Solutions

[Boneh-Halevi-Hamburg-Ostrovsky’08]

◮ Based on decisional Diffie-Hellman (DDH) assumption ◮ Security: Clique & KDM for affine functions Our Scheme [Applebaum-Cash-P-Sahai’09] ◮ Based on Learning With Errors (LWE) assumption [Regev’05] ◮ Security: same. Follows general [BHHO’08] approach.

15 / 19

slide-50
SLIDE 50

Solutions

[Boneh-Halevi-Hamburg-Ostrovsky’08]

◮ Based on decisional Diffie-Hellman (DDH) assumption ◮ Security: Clique & KDM for affine functions ◮ Large computation & communication. For k-bit message: Public key Enc Time Ciphertext k2 group elts k expon ≥ k group elts ⇓ ⇓ ⇓ k3 bits k4 bit ops ≥ k2 bits Our Scheme [Applebaum-Cash-P-Sahai’09] ◮ Based on Learning With Errors (LWE) assumption [Regev’05] ◮ Security: same. Follows general [BHHO’08] approach.

15 / 19

slide-51
SLIDE 51

Solutions

[Boneh-Halevi-Hamburg-Ostrovsky’08]

◮ Based on decisional Diffie-Hellman (DDH) assumption ◮ Security: Clique & KDM for affine functions ◮ Large computation & communication. For k-bit message: Public key Enc Time Ciphertext k2 group elts k expon ≥ k group elts ⇓ ⇓ ⇓ k3 bits k4 bit ops ≥ k2 bits Our Scheme [Applebaum-Cash-P-Sahai’09] ◮ Based on Learning With Errors (LWE) assumption [Regev’05] ◮ Security: same. Follows general [BHHO’08] approach. ◮ Efficiency: comes ‘for free∗’ with existing schemes! [R’05,PVW’08] Public key Enc Time Ciphertext ∼ k2 bits ∼ k2 ops ∼ k bits

15 / 19

slide-52
SLIDE 52

Regev’s Cryptosystem

◮ Decision LWE problem: distinguish samples (ai , bi = ai, s + ei) ∈ Zn

q × Zq

from uniform (ai , bi)

16 / 19

slide-53
SLIDE 53

Regev’s Cryptosystem

◮ Decision LWE problem: distinguish samples (ai , bi = ai, s + ei) ∈ Zn

q × Zq

from uniform (ai , bi) The Scheme ◮ Keys: sk = s ← Zn

q,

pk =     . . . At . . .     ,     . . . b . . .     = Ats + e

α · q

16 / 19

slide-54
SLIDE 54

Regev’s Cryptosystem

◮ Decision LWE problem: distinguish samples (ai , bi = ai, s + ei) ∈ Zn

q × Zq

from uniform (ai , bi) The Scheme ◮ Keys: sk = s ← Zn

q,

pk =     . . . At . . .     ,     . . . b . . .     = Ats + e

α · q

◮ Encrypt: Let (u = Ar , v = b, r) for r ← {0, 1}m. For message µ ∈ Zp (where p ≪ q), ciphertext = (u , v + µ · ⌊ q

p⌋).

16 / 19

slide-55
SLIDE 55

Regev’s Cryptosystem

◮ Decision LWE problem: distinguish samples (ai , bi = ai, s + ei) ∈ Zn

q × Zq

from uniform (ai , bi) The Scheme ◮ Keys: sk = s ← Zn

q,

pk =     . . . At . . .     ,     . . . b . . .     = Ats + e

α · q

◮ Encrypt: Let (u = Ar , v = b, r) for r ← {0, 1}m. For message µ ∈ Zp (where p ≪ q), ciphertext = (u , v + µ · ⌊ q

p⌋).

◮ Decrypt (u, v′): find the µ ∈ Zp such that v′ − u, s ≈ µ · ⌊ q

p⌋.

16 / 19

slide-56
SLIDE 56

Regev’s Cryptosystem

◮ Decision LWE problem: distinguish samples (ai , bi = ai, s + ei) ∈ Zn

q × Zq

from uniform (ai , bi) The Scheme ◮ Keys: sk = s ← Zn

q,

pk =     . . . At . . .     ,     . . . b . . .     = Ats + e

α · q

◮ Encrypt: Let (u = Ar , v = b, r) for r ← {0, 1}m. For message µ ∈ Zp (where p ≪ q), ciphertext = (u , v + µ · ⌊ q

p⌋).

◮ Decrypt (u, v′): find the µ ∈ Zp such that v′ − u, s ≈ µ · ⌊ q

p⌋.

◮ Security proof: uniform pk = (A, b) = ⇒ uniform ciphertext (u, v).

16 / 19

slide-57
SLIDE 57

Self-Reference ?

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

(Or any affine fct of s.)

17 / 19

slide-58
SLIDE 58

Self-Reference ?

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)? And does s1 ∈ Zq ‘fit’ into the message space Zp?

17 / 19

slide-59
SLIDE 59

Self-Reference ?

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

17 / 19

slide-60
SLIDE 60

Self-Reference !

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

Modifying the Scheme

1 Use q = p2 for divisibility.

(Need new search/decision reduction for LWE.)

17 / 19

slide-61
SLIDE 61

Self-Reference !

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

Modifying the Scheme

1 Use q = p2 for divisibility. 2 Give (u, v) a ‘nice’ distrib: use r ← Gaussian(Zm).

Then (u, v) is itself an LWEs sample∗.

[R’05,GPV’08]

17 / 19

slide-62
SLIDE 62

Self-Reference !

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

Modifying the Scheme

1 Use q = p2 for divisibility. 2 Give (u, v) a ‘nice’ distrib: use r ← Gaussian(Zm).

Then (u, v) is itself an LWEs sample∗.

[R’05,GPV’08] (And for security, (u, v) is still uniform∗ when (A, b) is uniform.)

17 / 19

slide-63
SLIDE 63

Self-Reference !

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

Modifying the Scheme

1 Use q = p2 for divisibility. 2 Give (u, v) a ‘nice’ distrib: use r ← Gaussian(Zm).

Then (u, v) is itself an LWEs sample∗.

[R’05,GPV’08] (And for security, (u, v) is still uniform∗ when (A, b) is uniform.)

3

Use a Gaussian secret s, so each si ∈ (− p

2, p 2): self-reference!

17 / 19

slide-64
SLIDE 64

Self-Reference !

An Observation ◮ With (u = Ar , v = b, r), the ciphertext (u′ = u − ⌊ q

p⌋ · e1 , v)

decrypts as v − u′, s ≈ (s1 mod p) · ⌊ q

p⌋.

◮ But: is (u′, v) distributed the same as (u, v′) ← Enc(s1 mod p)?

No!

And does s1 ∈ Zq ‘fit’ into the message space Zp?

Also no!

Modifying the Scheme

1 Use q = p2 for divisibility. 2 Give (u, v) a ‘nice’ distrib: use r ← Gaussian(Zm).

Then (u, v) is itself an LWEs sample∗.

[R’05,GPV’08] (And for security, (u, v) is still uniform∗ when (A, b) is uniform.)

3

Use a Gaussian secret s, so each si ∈ (− p

2, p 2): self-reference!

?? But is it secure to use such an s ??

17 / 19

slide-65
SLIDE 65

LWE with Gaussian Secret

◮ Transform LWEs (for arbitrary s) into LWEe for Gaussian secret e: Given the source LWEs of samples (ai , bi = ai, s + ei),

18 / 19

slide-66
SLIDE 66

LWE with Gaussian Secret

◮ Transform LWEs (for arbitrary s) into LWEe for Gaussian secret e: Given the source LWEs of samples (ai , bi = ai, s + ei),

1 Draw n samples (A , b = Ats + e) so that A is invertible mod q.

18 / 19

slide-67
SLIDE 67

LWE with Gaussian Secret

◮ Transform LWEs (for arbitrary s) into LWEe for Gaussian secret e: Given the source LWEs of samples (ai , bi = ai, s + ei),

1 Draw n samples (A , b = Ats + e) so that A is invertible mod q. 2 Draw and transform fresh samples:

(a, b) → (a′ = −A−1a , b + a′, b) = (a′ , a, s + e − A−1a, Ats + a′, e) = (a′ , a′, e + e).

18 / 19

slide-68
SLIDE 68

LWE with Gaussian Secret

◮ Transform LWEs (for arbitrary s) into LWEe for Gaussian secret e: Given the source LWEs of samples (ai , bi = ai, s + ei),

1 Draw n samples (A , b = Ats + e) so that A is invertible mod q. 2 Draw and transform fresh samples:

(a, b) → (a′ = −A−1a , b + a′, b) = (a′ , a, s + e − A−1a, Ats + a′, e) = (a′ , a′, e + e).

(Also maps uniform samples (a, b) to uniform (a′, b′)).

18 / 19

slide-69
SLIDE 69

LWE with Gaussian Secret

◮ Transform LWEs (for arbitrary s) into LWEe for Gaussian secret e: Given the source LWEs of samples (ai , bi = ai, s + ei),

1 Draw n samples (A , b = Ats + e) so that A is invertible mod q. 2 Draw and transform fresh samples:

(a, b) → (a′ = −A−1a , b + a′, b) = (a′ , a, s + e − A−1a, Ats + a′, e) = (a′ , a′, e + e).

(Also maps uniform samples (a, b) to uniform (a′, b′)).

Clique & Affine Security (Again, For Free) ◮ Repeating transform produces ind. sources LWEe1 , LWEe2 , . . . ◮ Side effect: a known affine relation between unknowns s and ei. This lets us create Encpki(affine(ej)) for any i, j.

18 / 19

slide-70
SLIDE 70

Final Words

◮ The simple, linear structure of lattice-based encryption allows for many enhancements. ◮ There is much more to be done!

19 / 19

slide-71
SLIDE 71

Final Words

◮ The simple, linear structure of lattice-based encryption allows for many enhancements. ◮ There is much more to be done!

Thanks!

19 / 19