skip to main content
10.1145/1536414.1536461acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Public-key cryptosystems from the worst-case shortest vector problem: extended abstract

Published:31 May 2009Publication History

ABSTRACT

We construct public-key cryptosystems that are secure assuming theworst-case hardness of approximating the minimum distance on n-dimensional lattices to within small Poly(n) factors. Prior cryptosystems with worst-case connections were based either on the shortest vector problem for a special class of lattices (Ajtai and Dwork, STOC 1997; Regev, J. ACM 2004), or on the conjectured hardness of lattice problems for quantum algorithms (Regev, STOC 2005). Our main technical innovation is a reduction from variants of the shortest vector problem to corresponding versions of the "learning with errors" (LWE) problem; previously, only a quantum reduction of this kind was known. As an additional contribution, we construct a natural chosen ciphertext-secure cryptosystem having a much simpler description and tighter underlying worst-case approximation factor than prior schemes.

References

  1. M. Ajtai. Generating hard instances of the short basis problem. In ICALP, pages 1--9, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Ajtai. Generating hard instances of lattice problems. Quaderni di Matematica, 13:1--32, 2004. Preliminary version in STOC 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Ajtai and C. Dwork. A public--key cryptosystem with worst-case/average-case equivalence. In STOC, pages 284--293, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Ajtai and C. Dwork. The first and fourth public-key cryptosystems with worst-case/average-case equivalence. Electronic Colloquium on Computational Complexity (ECCC), 14(97), 2007.Google ScholarGoogle Scholar
  5. M. Ajtai, R. Kumar, and D. Sivakumar. A sieve algorithm for the shortest lattice vector problem. In STOC, pages 601--610, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In TCC, pages 474--495, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Alwen and C. Peikert. Generating shorter bases for hard random lattices. In STACS, pages 75--86, 2009.Google ScholarGoogle Scholar
  8. L. Babai. On Lovász' lattice reduction and the nearest lattice point problem. Combinatorica, 6(1):1--13, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J.-Y. Cai. A relation of primal-dual lattices and the complexity of shortest lattice vector problem. Theor. Comput. Sci., 207(1):105--116, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Cash, C. Peikert, and A. Sahai. Efficient circular-secure encryption from hard learning problems. Manuscript, 2009.Google ScholarGoogle Scholar
  11. N. Gama and P. Q. Nguyen. Predicting lattice reduction. In EUROCRYPT, pages 31--51, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In STOC, pages 197--206, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. O. Goldreich and S. Goldwasser. On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci., 60(3):540--563, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. O. Goldreich, S. Goldwasser, and S. Halevi. Public-key cryptosystems from lattice reduction problems. In CRYPTO, pages 112--131, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In STOC, pages 25--32, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. Syst. Sci., 28(2):270--299, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  17. R. Impagliazzo. A personal view of average-case complexity. In Structure in Complexity Theory Conference, pages 134--147, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Kawachi, K. Tanaka, and K. Xagawa. Multi-bit cryptosystems based on lattice problems. In Public Key Cryptography, pages 315--329, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. R. Klivans and A. A. Sherstov. Cryptographic hardness for learning intersections of halfspaces. In FOCS, pages 553--562, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Annalen, 261(4):515--534, December 1982.Google ScholarGoogle ScholarCross RefCross Ref
  21. V. Lyubashevsky and D. Micciancio. On bounded distance decoding, unique shortest vectors, and the minimum distance problem. Manuscript, 2009.Google ScholarGoogle Scholar
  22. D. Micciancio and O. Regev. Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput., 37(1):267--302, 2007. Preliminary version in FOCS 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Peikert. Limits on the hardness of lattice problems in lp norms. Computational Complexity, 17(2):300--351, May 2008. Preliminary version in CCC 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem. Electronic Colloquium on Computational Complexity (ECCC), 15(100), 2008.Google ScholarGoogle Scholar
  25. C. Peikert, V. Vaikuntanathan, and B. Waters. A framework for efficient and composable oblivious transfer. In CRYPTO, pages 554--571, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C. Peikert and B. Waters. Lossy trapdoor functions and their applications. In STOC, pages 187--196, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. O. Regev. Lecture notes on lattices in computer science, 2004. Available at http://www.cs.tau.ac.il/odedr/teaching/lattices_fall_2004/index.html, last accessed 28 Feb 2008.Google ScholarGoogle Scholar
  28. O. Regev. New lattice-based cryptographic constructions. J. ACM, 51(6):899--942, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In STOC, pages 84--93, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. O. Regev, December 2008. Personal communication.Google ScholarGoogle Scholar
  31. A. Rosen and G. Segev. Chosen-ciphertext security via correlated products. In TCC, pages 419--436, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '09: Proceedings of the forty-first annual ACM symposium on Theory of computing
      May 2009
      750 pages
      ISBN:9781605585062
      DOI:10.1145/1536414

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 May 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader