11 research outputs found
A New Reduction from Search SVP to Optimization SVP
It is well known that search SVP is equivalent to optimization SVP. However,
the former reduction from search SVP to optimization SVP by Kannan needs
polynomial times calls to the oracle that solves the optimization SVP. In this
paper, a new rank-preserving reduction is presented with only one call to the
optimization SVP oracle. It is obvious that the new reduction needs the least
calls, and improves Kannan's classical result. What's more, the idea also leads
a similar direct reduction from search CVP to optimization CVP with only one
call to the oracle
Random Integer Lattice Generation via HNF
Lattices used in cryptography are integer lattices. Defining and generating a random integer lattice are interesting topics. A generation algorithm for random integer lattice can be used to serve as a random input of all the lattice algorithms. In this paper, we recall the definition of random integer lattice given by G.Hu et al. and present an improved generation algorithm for it via Hermite Normal Form. It can be proved that with probability >= 0.99, this algorithm outputs an n-dim random integer lattice within O(n^2) operations
Secure Two-party Computation Approach for NTRUEncrypt
Secure multi-party computation can provide a solution for privacy protection and ensure the correctness of the final calculation results. Lattice-based algorithms are considered to be one of the most promising post-quantum cryptographic algorithms due to a better balance among security, key sizes and calculation speeds. The NTRUEncrypt is a lattice-based anti-quantum attack cryptographic algorithm. Since there haven\u27t been much candidate post-quantum cryptographic algorithms for secure multi-party computation. In this paper, we propose a novel secure two-party computation scheme based on NTRUEncrypt and implement the polynomial multiplication operations under NTRUEncrypt-OT. Our secure two-party computation scheme mainly uses oblivious transfer and privacy set interaction. We prove the security of our scheme in the semi-honest model. Our scheme can be applied for multi-party computation scenarios, such as quantum attack-resisted E-votes or E-auctions
Fully Homomorphic Encryption with k-bit Arithmetic Operations
We present a fully homomorphic encryption scheme continuing the line of works
of Ducas and Micciancio (2015, [DM15]), Chillotti et al. (2016, [CGGI16a]; 2017,
[CGGI17]; 2018, [CGGI18a]), and Gao (2018,[Gao18]). Ducas and Micciancio (2015)
show that homomorphic computation of one bit operation on LWE ciphers can be done
in less than a second, which is then reduced by Chillotti et al. (2016, 2017, 2018) to
13ms. According to Chillotti et al. (2018, [CGGI18b]), the cipher expansion for TFHE
is still 8000. The ciphertext expansion problem was greatly reduced by Gao (2018) to
6 with private-key encryption and 20 for public key encryption. The bootstrapping in
Gao (2018) is only done one bit at a time, and the bootstrapping design matches the
previous two works in efficiency.
Our contribution is to present a fully homomorphic encryption scheme based on
these preceding schemes that generalizes the Gao (2018) scheme to perform operations
on k-bit encrypted data and also removes the need for the Independence Heuristic of
the Chillotti et al. papers. The amortized cost of computing k-bits at a time improves
the efficiency. Operations supported include addition and multiplication modulo ,
addition and multiplication in the integers as well as exponentiation, field inversion
and the machine learning activation function RELU. The ciphertext expansion factor
is also further improved, for our scheme achieves a ciphertext expansion factor of
2.5 under secret key and 6.5 under public key. Asymptotically as k increases, our scheme
achieves the optimal ciphertext expansion factor of 1 under private key encryption and
2 under public key encryption. We also introduces techniques for reducing the size of
the bootstrapping key.
Keywords. FHE, lattices, learning with errors (LWE), ring learning with errors
(RLWE), TFHE, data security, RELU, machine learnin
Random Integer Lattice Generation via the Hermite Normal Form
Lattices used in cryptography are integer lattices. Defining and generating a ârandom integer latticeâ are interesting topics. A generation algorithm for a random integer lattice can be used to serve as a random input of all the lattice algorithms. In this paper, we recall the definition of the random integer lattice given by G. Hu et al. and present an improved generation algorithm for it via the Hermite normal form. It can be proven that with probability â„0.99, this algorithm outputs an n-dim random integer lattice within O(n2) operations
Improvements on Reductions among DIfferent Variants SVP and CVP
The LNCS volume still has not appeared.International audienc
Fuzzy Identity-Based Ring Signature from Lattices
In this paper, a construction of a fuzzy identity-based ring signature scheme (LFIBRS) is proposed. Our LFIBRS combines the characteristics of both the fuzzy identity-based signature (FIBS) and the ring signature. On the one hand, a signature issued under an identity ID can be verified by any identity IDâČ that is âclose enoughâ to the identity ID. Since biometric identification is the well-known most popular and reliable identification method, our LFIBRS can be applied in such a situation whenever it is required for official audit or supervision that the signerâs real identity is needed to be authenticated. On the other hand, LFIBRS provides anonymity under the random oracle model. In addition, LFIBRS provides unforgeability under the small integer solution (SIS) lattice hardness assumption which can resist large-scale quantum computer attacks in the future
A Novel Linkable Ring Signature on Ideal Lattices
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public key in the ring and the signerâs private key are based on random numbers. This setting makes it unnecessary to set the linkable label separately for our constructed scheme. When judging the linkability, it is necessary to determine whether the number of the intersections of the two sets reaches the threshold related to the number of the ring members. In addition, under the random oracle model, the unforgeability is reduced to the SVPÎł problem. The anonymity is proved based on the definition of statistical distance and its properties
Solving Random Subset Sum Problem by -norm SVP Oracle
International audienc
Cuproof: A Novel Range Proof with Constant Size
Zero-knowledge proof is widely used in blockchains. For example, zk-SNARK is used by Zcash as its core technology in identifying transactions. Up to now, various range proofs have been proposed, and their efficiency and range-flexibility are enhanced. Bootle et al. used inner product method and recursion to make an efficient zero-knowledge proof. Then, Benediky BĂŒnz et al. came up with an efficient zero-knowledge proof scheme called Bulletproofs which can convince the verifier that a secret number lies in . By combining inner-product and Lagrange\u27s four-square theorem, we structure a range proof scheme which is called Cuproof. The scheme of Cuproof would make a range proof to prove that a secret number without exposing redundant information of . In Cuproof, all the communication cost, the proving time and the verification time are constant. When the interval of the range proof is large, our Cuproof would show much better