skip to main content
research-article

On Ideal Lattices and Learning with Errors over Rings

Published:01 November 2013Publication History
Skip Abstract Section

Abstract

The “learning with errors” (LWE) problem is to distinguish random linear equations, which have been perturbed by a small amount of noise, from truly uniform ones. The problem has been shown to be as hard as worst-case lattice problems, and in recent years it has served as the foundation for a plethora of cryptographic applications. Unfortunately, these applications are rather inefficient due to an inherent quadratic overhead in the use of LWE. A main open question was whether LWE and its applications could be made truly efficient by exploiting extra algebraic structure, as was done for lattice-based hash functions (and related primitives).

We resolve this question in the affirmative by introducing an algebraic variant of LWE called ring-LWE, and proving that it too enjoys very strong hardness guarantees. Specifically, we show that the ring-LWE distribution is pseudorandom, assuming that worst-case problems on ideal lattices are hard for polynomial-time quantum algorithms. Applications include the first truly practical lattice-based public-key cryptosystem with an efficient security reduction; moreover, many of the other applications of LWE can be made much more efficient through the use of ring-LWE.

References

  1. Shweta Agrawal, Dan Boneh, and Xavier Boyen. 2010a. Efficient lattice (H)IBE in the standard model. In Proceedings of EUROCRYPT. 553--572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Shweta Agrawal, Dan Boneh, and Xavier Boyen. 2010b. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In Proceedings of CRYPTO. 98--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Miklós Ajtai. 2004. Generating hard instances of lattice problems. Quad. Matemat. 13, 1--32.Google ScholarGoogle Scholar
  4. Miklós Ajtai, Ravi Kumar, and D. Sivakumar. 2001. A sieve algorithm for the shortest lattice vector problem. In Proceedings of STOC. 601--610. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Adi Akavia, Shafi Goldwasser, and Vinod Vaikuntanathan. 2009. Simultaneous hardcore bits and cryptography against memory attacks. In Proceedings of TCC. 474--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Benny Applebaum, David Cash, Chris Peikert, and Amit Sahai. 2009. Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In Proceedings of CRYPTO. 595--618. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Wojciech Banaszczyk. 1993. New bounds in some transference theorems in the geometry of numbers. Math. Ann. 296, 4, 625--635.Google ScholarGoogle ScholarCross RefCross Ref
  8. Avrim Blum, Merrick L. Furst, Michael J. Kearns, and Richard J. Lipton. 1993. Cryptographic primitives based on hard learning problems. In Proceedings of CRYPTO. 278--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Xavier Boyen. 2010. Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In Proceedings of Public Key Cryptography. 499--517. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zvika Brakerski and Vinod Vaikuntanathan. 2011. Efficient fully homomorphic encryption from (standard) LWE. In Proceedings of FOCS. 97--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In Proceedings of ICTS. 309--325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zvika Brakerski, Adeline Langlois, Chris Peikert, Oded Regev, and Damien Stehlé. 2013. Classical hardness of learning with errors. In Proceedings of STOC. 575--584. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert. 2010. Bonsai trees, or how to delegate a lattice basis. In Proceedings of EUROCRYPT. 523--552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Henri Cohen. 1993. A Course in Computational Algebraic Number Theory. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Keith Conrad. 2009. The different ideal. http://www.math.uconn.edu/~kconrad/blurbs/ (last accessed 12 Oct. 2009).Google ScholarGoogle Scholar
  16. Whitfield Diffie and Martin E. Hellman. 1976. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6, 644--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Taher ElGamal. 1984. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO. 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Paul Erdős. 1946. On the coefficients of the cyclotomic polynomial. Bull. Amer. Math. Soc. 52, 2, 179--184.Google ScholarGoogle ScholarCross RefCross Ref
  19. Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of STOC. 169--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. 2008. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of STOC. 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Oded Goldreich. 2004. Foundations of Cryptography. Vol. II, Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Oded Goldreich, Shafi Goldwasser, and Shai Halevi. 1996. Collision-free hashing from lattice problems. Electron. Colloq. Computat. Complex. 3, 42.Google ScholarGoogle Scholar
  23. Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, and Vinod Vaikuntanathan. 2010. Robustness of the learning with errors assumption. In Proceedings of ICS. 230--240.Google ScholarGoogle Scholar
  24. Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. 1998. NTRU: A ring-based public key cryptosystem. In Proceedings of ANTS. 267--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Akinori Kawachi, Keisuke Tanaka, and Keita Xagawa. 2008. Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In Proceedings of ASIACRYPT. 372--389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Adeline Langlois and Damien Stehlé. 2013. Worst-case to average-case reductions for module lattices. Submitted.Google ScholarGoogle Scholar
  27. Richard Lindner and Chris Peikert. 2011. Better key sizes (and attacks) for LWE-based encryption. In Proceedings of CT-RSA. 319--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Adriana López-Alt, Eran Tromer, and Vinod Vaikuntanathan. 2012. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In Proceedings of STOC. 1219--1234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Vadim Lyubashevsky. 2008. Lattice-based identification schemes secure under active attacks. In Proceedings of Public Key Cryptography. 162--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Vadim Lyubashevsky. 2009. Fiat-Shamir with aborts: Applications to lattice and factoring-based signatures. In Proceedings of ASIACRYPT. 598--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Vadim Lyubashevsky. 2012. Lattice signatures without trapdoors. In Proceedings of EUROCRYPT. 738--755. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Vadim Lyubashevsky and Daniele Micciancio. 2006. Generalized compact knapsacks are collision resistant. In Proceedings of ICALP (2). 144--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Vadim Lyubashevsky and Daniele Micciancio. 2008. Asymptotically efficient lattice-based digital signatures. In Proceedings of TCC. 37--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, and Alon Rosen. 2008. SWIFFT: A modest proposal for FFT hashing. In Proceedings of FSE. 54--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2013. A toolkit for ring-LWE cryptography. In Proceedings of EUROCRYPT. 35--54.Google ScholarGoogle ScholarCross RefCross Ref
  36. Daniele Micciancio. 2007. Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity 16, 4, 365--411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Daniele Micciancio and Chris Peikert. 2012. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of EUROCRYPT. 700--718. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Daniele Micciancio and Oded Regev. 2007. Worst-case to average-case reductions based on gaussian measures. SIAM J. Comput. 37, 1, 267--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Daniele Micciancio and Oded Regev. 2009. Lattice-based cryptography. In Post Quantum Cryptography, Springer, 147--191.Google ScholarGoogle Scholar
  40. Daniele Micciancio and Salil P. Vadhan. 2003. Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In Proceedings of CRYPTO. 282--298.Google ScholarGoogle Scholar
  41. Daniele Micciancio and Panagiotis Voulgaris. 2010. A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. In Proceedings of STOC. 351--358. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Chris Peikert. 2009. Public-key cryptosystems from the worst-case shortest vector problem. In Proceedings of STOC. 333--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Chris Peikert and Alon Rosen. 2006. Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In Proceedings of TCC. 145--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Chris Peikert and Alon Rosen. 2007. Lattices that admit logarithmic worst-case to average-case connection factors. In Proceedings of STOC. 478--487. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Chris Peikert and Brent Waters. 2008. Lossy trapdoor functions and their applications. In Proceedings of STOC. 187--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Chris Peikert, Vinod Vaikuntanathan, and Brent Waters. 2008. A framework for efficient and composable oblivious transfer. In Proceedings of CRYPTO. 554--571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56, 6, 1--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Peter Roquette. 1967. On class field towers. In Algebraic Number Theory, John William Scott Cassels and Albrecht Fröhlich Eds., Academic Press, 231--249.Google ScholarGoogle Scholar
  49. Victor Shoup. 2009. A Computational Introduction to Number Theory and Algebra. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Damien Stehlé and Ron Steinfeld. 2011. Making NTRU as secure as worst-case problems over ideal lattices. In Proceedings of EUROCRYPT. 27--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, and Keita Xagawa. 2009. Efficient public key encryption based on ideal lattices. In Proceedings of ASIACRYPT. 617--635. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. William Stein. 2004. A brief introduction to classical and adelic algebraic number theory. http://modular.math.washington.edu/papers/ant/ (last accessed 12 Oct. 2009).Google ScholarGoogle Scholar

Index Terms

  1. On Ideal Lattices and Learning with Errors over Rings

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of the ACM
      Journal of the ACM  Volume 60, Issue 6
      November 2013
      239 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/2555516
      Issue’s Table of Contents

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 November 2013
      • Accepted: 1 July 2013
      • Revised: 1 June 2013
      • Received: 1 May 2012
      Published in jacm Volume 60, Issue 6

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader