Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Learning with errors

From Wikipedia, the free encyclopedia
Mathematical problem in cryptography
This articlemay be too technical for most readers to understand. Pleasehelp improve it tomake it understandable to non-experts, without removing the technical details.(October 2018) (Learn how and when to remove this message)

Incryptography,learning with errors (LWE) is a mathematical problem that is widely used to create secureencryption algorithms.[1] It is based on the idea of representing secret information as a set of equations with errors. In other words, LWE is a way to hide the value of a secret by introducing noise to it.[2] In more technical terms, it refers to thecomputational problem of inferring a linearn{\displaystyle n}-ary functionf{\displaystyle f} over a finitering from given samplesyi=f(xi){\displaystyle y_{i}=f(\mathbf {x} _{i})} some of which may be erroneous. The LWE problem is conjectured to be hard to solve,[1] and thus to be useful in cryptography.

More precisely, the LWE problem is defined as follows. LetZq{\displaystyle \mathbb {Z} _{q}} denote the ring of integersmoduloq{\displaystyle q} and letZqn{\displaystyle \mathbb {Z} _{q}^{n}} denote the set ofn{\displaystyle n}-vectors overZq{\displaystyle \mathbb {Z} _{q}}. There exists a certain unknown linear functionf:ZqnZq{\displaystyle f:\mathbb {Z} _{q}^{n}\rightarrow \mathbb {Z} _{q}}, and the input to the LWE problem is a sample of pairs(x,y){\displaystyle (\mathbf {x} ,y)}, wherexZqn{\displaystyle \mathbf {x} \in \mathbb {Z} _{q}^{n}} andyZq{\displaystyle y\in \mathbb {Z} _{q}}, so that with high probabilityy=f(x){\displaystyle y=f(\mathbf {x} )}. Furthermore, the deviation from the equality is according to some known noise model. The problem calls for finding the functionf{\displaystyle f}, or some close approximation thereof,with high probability.

The LWE problem was introduced byOded Regev in 2005[3] (who won the 2018Gödel Prize for this work); it is a generalization of theparity learning problem. Regev showed that the LWE problem is as hard to solve as several worst-caselattice problems. Subsequently, the LWE problem has been used as ahardness assumption to createpublic-key cryptosystems,[3][4] such as thering learning with errors key exchange by Peikert.[5]

Definition

[edit]

Denote byT=R/Z{\displaystyle \mathbb {T} =\mathbb {R} /\mathbb {Z} } theadditive group on reals modulo one. LetsZqn{\displaystyle \mathbf {s} \in \mathbb {Z} _{q}^{n}} be a fixed vector.Letϕ{\displaystyle \phi } be a fixed probability distribution overT{\displaystyle \mathbb {T} }.Denote byAs,ϕ{\displaystyle A_{\mathbf {s} ,\phi }} the distribution onZqn×T{\displaystyle \mathbb {Z} _{q}^{n}\times \mathbb {T} } obtained as follows.

  1. Pick a vectoraZqn{\displaystyle \mathbf {a} \in \mathbb {Z} _{q}^{n}} from the uniform distribution overZqn{\displaystyle \mathbb {Z} _{q}^{n}},
  2. Pick a numbereT{\displaystyle e\in \mathbb {T} } from the distributionϕ{\displaystyle \phi },
  3. Evaluatet=a,s/q+e{\displaystyle t=\langle \mathbf {a} ,\mathbf {s} \rangle /q+e}, wherea,s=i=1naisi{\displaystyle \textstyle \langle \mathbf {a} ,\mathbf {s} \rangle =\sum _{i=1}^{n}a_{i}s_{i}} is the standard inner product inZqn{\displaystyle \mathbb {Z} _{q}^{n}}, the division is done in thefield of reals (or more formally, this "division byq{\displaystyle q}" is notation for the group homomorphismZqT{\displaystyle \mathbb {Z} _{q}\longrightarrow \mathbb {T} } mapping1Zq{\displaystyle 1\in \mathbb {Z} _{q}} to1/q+ZT{\displaystyle 1/q+\mathbb {Z} \in \mathbb {T} }), and the final addition is inT{\displaystyle \mathbb {T} }.
  4. Output the pair(a,t){\displaystyle (\mathbf {a} ,t)}.

Thelearning with errors problemLWEq,ϕ{\displaystyle \mathrm {LWE} _{q,\phi }} is to findsZqn{\displaystyle \mathbf {s} \in \mathbb {Z} _{q}^{n}}, given access to polynomially many samples of choice fromAs,ϕ{\displaystyle A_{\mathbf {s} ,\phi }}.

For everyα>0{\displaystyle \alpha >0}, denote byDα{\displaystyle D_{\alpha }} the one-dimensionalGaussian with zero mean and varianceα2/(2π){\displaystyle \alpha ^{2}/(2\pi )}, that is, the density function isDα(x)=ρα(x)/α{\displaystyle D_{\alpha }(x)=\rho _{\alpha }(x)/\alpha } whereρα(x)=eπ(|x|/α)2{\displaystyle \rho _{\alpha }(x)=e^{-\pi (|x|/\alpha )^{2}}}, and letΨα{\displaystyle \Psi _{\alpha }} be the distribution onT{\displaystyle \mathbb {T} } obtained by consideringDα{\displaystyle D_{\alpha }} modulo one. The version of LWE considered in most of the results would beLWEq,Ψα{\displaystyle \mathrm {LWE} _{q,\Psi _{\alpha }}}

Decision version

[edit]

TheLWE problem described above is thesearch version of the problem. In thedecision version (DLWE), the goal is to distinguish between noisy inner products and uniformly random samples fromZqn×T{\displaystyle \mathbb {Z} _{q}^{n}\times \mathbb {T} } (practically, some discretized version of it). Regev[3] showed that thedecision andsearch versions are equivalent whenq{\displaystyle q} is a prime bounded by some polynomial inn{\displaystyle n}.

Solving decision assuming search

[edit]

Intuitively, if we have a procedure for the search problem, the decision version can be solved easily: just feed the input samples for the decision problem to the solver for the search problem. Denote the given samples by{(ai,bi)}Zqn×T{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i})\}\subset \mathbb {Z} _{q}^{n}\times \mathbb {T} }. If the solver returns a candidates{\displaystyle \mathbf {s} }, for alli{\displaystyle i}, calculate{ai,sbi}{\displaystyle \{\langle \mathbf {a} _{i},\mathbf {s} \rangle -\mathbf {b} _{i}\}}. If the samples are from an LWE distribution, then the results of this calculation will be distributed accordingχ{\displaystyle \chi }, but if the samples are uniformly random, these quantities will be distributed uniformly as well.

Solving search assuming decision

[edit]

For the other direction, given a solver for the decision problem, the search version can be solved as follows: Recovers{\displaystyle \mathbf {s} } one coordinate at a time. To obtain the first coordinate,s1{\displaystyle \mathbf {s} _{1}}, make a guesskZq{\displaystyle k\in \mathbb {Z} _{q}}, and do the following. Choose a numberrZq{\displaystyle r\in \mathbb {Z} _{q}} uniformly at random. Transform the given samples{(ai,bi)}Zqn×T{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i})\}\subset \mathbb {Z} _{q}^{n}\times \mathbb {T} } as follows. Calculate{(ai+(r,0,,0),bi+(rk)/q)}{\displaystyle \{(\mathbf {a} _{i}+(r,0,\ldots ,0),\mathbf {b} _{i}+(rk)/q)\}}. Send the transformed samples to the decision solver.

If the guessk{\displaystyle k} was correct, the transformation takes the distributionAs,χ{\displaystyle A_{\mathbf {s} ,\chi }} to itself, and otherwise, sinceq{\displaystyle q} is prime, it takes it to the uniform distribution. So, given a polynomial-time solver for the decision problem that errs with very small probability, sinceq{\displaystyle q} is bounded by some polynomial inn{\displaystyle n}, it only takes polynomial time to guess every possible value fork{\displaystyle k} and use the solver to see which one is correct.

After obtainings1{\displaystyle \mathbf {s} _{1}}, we follow an analogous procedure for each other coordinatesj{\displaystyle \mathbf {s} _{j}}. Namely, we transform ourbi{\displaystyle \mathbf {b} _{i}} samples the same way, and transform ourai{\displaystyle \mathbf {a} _{i}} samples by calculatingai+(0,,r,,0){\displaystyle \mathbf {a} _{i}+(0,\ldots ,r,\ldots ,0)}, where ther{\displaystyle r} is in thejth{\displaystyle j^{\text{th}}} coordinate.[3]

Peikert[4] showed that this reduction, with a small modification, works for anyq{\displaystyle q} that is a product of distinct, small (polynomial inn{\displaystyle n}) primes. The main idea is ifq=q1q2qt{\displaystyle q=q_{1}q_{2}\cdots q_{t}}, for eachq{\displaystyle q_{\ell }}, guess and check to see ifsj{\displaystyle \mathbf {s} _{j}} is congruent to0modq{\displaystyle 0\mod q_{\ell }}, and then use theChinese remainder theorem to recoversj{\displaystyle \mathbf {s} _{j}}.

Average case hardness

[edit]

Regev[3] showed therandom self-reducibility of theLWE andDLWE problems for arbitraryq{\displaystyle q} andχ{\displaystyle \chi }. Given samples{(ai,bi)}{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i})\}} fromAs,χ{\displaystyle A_{\mathbf {s} ,\chi }}, it is easy to see that{(ai,bi+ai,t)/q}{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i}+\langle \mathbf {a} _{i},\mathbf {t} \rangle )/q\}} are samples fromAs+t,χ{\displaystyle A_{\mathbf {s} +\mathbf {t} ,\chi }}.

So, suppose there was some setSZqn{\displaystyle {\mathcal {S}}\subset \mathbb {Z} _{q}^{n}} such that|S|/|Zqn|=1/poly(n){\displaystyle |{\mathcal {S}}|/|\mathbb {Z} _{q}^{n}|=1/\operatorname {poly} (n)}, and for distributionsAs,χ{\displaystyle A_{\mathbf {s} ',\chi }}, withsS{\displaystyle \mathbf {s} '\leftarrow {\mathcal {S}}},DLWE was easy.

Then there would be some distinguisherA{\displaystyle {\mathcal {A}}}, who, given samples{(ai,bi)}{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i})\}}, could tell whether they were uniformly random or fromAs,χ{\displaystyle A_{\mathbf {s} ',\chi }}. If we need to distinguish uniformly random samples fromAs,χ{\displaystyle A_{\mathbf {s} ,\chi }}, wheres{\displaystyle \mathbf {s} } is chosen uniformly at random fromZqn{\displaystyle \mathbb {Z} _{q}^{n}}, we could simply try different valuest{\displaystyle \mathbf {t} } sampled uniformly at random fromZqn{\displaystyle \mathbb {Z} _{q}^{n}}, calculate{(ai,bi+ai,t)/q}{\displaystyle \{(\mathbf {a} _{i},\mathbf {b} _{i}+\langle \mathbf {a} _{i},\mathbf {t} \rangle )/q\}} and feed these samples toA{\displaystyle {\mathcal {A}}}. SinceS{\displaystyle {\mathcal {S}}} comprises a large fraction ofZqn{\displaystyle \mathbb {Z} _{q}^{n}}, with high probability, if we choose a polynomial number of values fort{\displaystyle \mathbf {t} }, we will find one such thats+tS{\displaystyle \mathbf {s} +\mathbf {t} \in {\mathcal {S}}}, andA{\displaystyle {\mathcal {A}}} will successfully distinguish the samples.

Thus, no suchS{\displaystyle {\mathcal {S}}} can exist, meaningLWE andDLWE are (up to a polynomial factor) as hard in the average case as they are in the worst case.

Hardness results

[edit]

Regev's result

[edit]

For an-dimensional latticeL{\displaystyle L}, letsmoothing parameterηε(L){\displaystyle \eta _{\varepsilon }(L)} denote the smallests{\displaystyle s} such thatρ1/s(L{0})ε{\displaystyle \rho _{1/s}(L^{*}\setminus \{\mathbf {0} \})\leq \varepsilon } whereL{\displaystyle L^{*}} is the dual ofL{\displaystyle L} andρα(x)=eπ(|x|/α)2{\displaystyle \rho _{\alpha }(x)=e^{-\pi (|x|/\alpha )^{2}}} is extended to sets by summing over function values at each element in the set. LetDL,r{\displaystyle D_{L,r}} denote the discrete Gaussian distribution onL{\displaystyle L} of widthr{\displaystyle r} for a latticeL{\displaystyle L} and realr>0{\displaystyle r>0}. The probability of eachxL{\displaystyle x\in L} is proportional toρr(x){\displaystyle \rho _{r}(x)}.

Thediscrete Gaussian sampling problem (DGS) is defined as follows: An instance ofDGSϕ{\displaystyle DGS_{\phi }} is given by ann{\displaystyle n}-dimensional latticeL{\displaystyle L} and a numberrϕ(L){\displaystyle r\geq \phi (L)}. The goal is to output a sample fromDL,r{\displaystyle D_{L,r}}. Regev shows that there is a reduction fromGapSVP100nγ(n){\displaystyle \operatorname {GapSVP} _{100{\sqrt {n}}\gamma (n)}} toDGSnγ(n)/λ(L){\displaystyle DGS_{{\sqrt {n}}\gamma (n)/\lambda (L^{*})}} for any functionγ(n)1{\displaystyle \gamma (n)\geq 1}.

Regev then shows that there exists an efficientquantum algorithm forDGS2nηε(L)/α{\displaystyle DGS_{{\sqrt {2n}}\eta _{\varepsilon }(L)/\alpha }} given access to an oracle forLWEq,Ψα{\displaystyle \mathrm {LWE} _{q,\Psi _{\alpha }}} for integerq{\displaystyle q} andα(0,1){\displaystyle \alpha \in (0,1)} such thatαq>2n{\displaystyle \alpha q>2{\sqrt {n}}}. This implies the hardness for LWE. Although the proof of this assertion works for anyq{\displaystyle q}, for creating a cryptosystem, the modulusq{\displaystyle q} has to be polynomial inn{\displaystyle n}.

Peikert's result

[edit]

Peikert proves[4] that there is a probabilistic polynomial time reduction from theGapSVPζ,γ{\displaystyle \operatorname {GapSVP} _{\zeta ,\gamma }} problem in the worst case to solvingLWEq,Ψα{\displaystyle \mathrm {LWE} _{q,\Psi _{\alpha }}} usingpoly(n){\displaystyle \operatorname {poly} (n)} samples for parametersα(0,1){\displaystyle \alpha \in (0,1)},γ(n)n/(αlogn){\displaystyle \gamma (n)\geq n/(\alpha {\sqrt {\log n}})},ζ(n)γ(n){\displaystyle \zeta (n)\geq \gamma (n)} andq(ζ/n)ωlogn){\displaystyle q\geq (\zeta /{\sqrt {n}})\omega {\sqrt {\log n}})}.

Use in cryptography

[edit]

TheLWE problem serves as a versatile problem used in construction of several[3][4][6][7] cryptosystems. In 2005, Regev[3] showed that the decision version of LWE is hard assuming quantum hardness of thelattice problemsGapSVPγ{\displaystyle \mathrm {GapSVP} _{\gamma }} (forγ{\displaystyle \gamma } as above) andSIVPt{\displaystyle \mathrm {SIVP} _{t}} witht=O(n/α){\displaystyle t=O(n/\alpha )}). In 2009, Peikert[4] proved a similar result assuming only the classical hardness of the related problemGapSVPζ,γ{\displaystyle \mathrm {GapSVP} _{\zeta ,\gamma }}. The disadvantage of Peikert's result is that it bases itself on a non-standard version of an easier (when compared to SIVP) problem GapSVP.

Public-key cryptosystem

[edit]

Regev[3] proposed apublic-key cryptosystem based on the hardness of theLWE problem. The cryptosystem as well as the proof of security and correctness are completely classical. The system is characterized bym,q{\displaystyle m,q} and a probability distributionχ{\displaystyle \chi } onT{\displaystyle \mathbb {T} }. The setting of the parameters used in proofs of correctness and security is

The cryptosystem is then defined by:

(iSai,x2+iSbi){\displaystyle \left(\sum _{i\in S}\mathbf {a} _{i},{\frac {x}{2}}+\sum _{i\in S}b_{i}\right)}

The proof of correctness follows from choice of parameters and some probability analysis. The proof of security is by reduction to the decision version ofLWE: an algorithm for distinguishing between encryptions (with above parameters) of0{\displaystyle 0} and1{\displaystyle 1} can be used to distinguish betweenAs,χ{\displaystyle A_{s,\chi }} and the uniform distribution overZqn×T{\displaystyle \mathbb {Z} _{q}^{n}\times \mathbb {T} }

CCA-secure cryptosystem

[edit]
[icon]
This sectionneeds expansion. You can help byadding missing information.(December 2009)

Peikert[4] proposed a system that is secure even against anychosen-ciphertext attack.

Key exchange

[edit]
Main article:Ring learning with errors key exchange

The idea of using LWE and Ring LWE for key exchange was proposed and filed at the University of Cincinnati in 2011 by Jintai Ding. The idea comes from the associativity of matrix multiplications, and the errors are used to provide the security. The paper[8] appeared in 2012 after a provisional patent application was filed in 2012.

The security of the protocol is proven based on the hardness of solving the LWE problem. In 2014, Peikert presented a key-transport scheme[9] following the same basic idea of Ding's, where the new idea of sending an additional 1-bit signal for rounding in Ding's construction is also used. The "new hope" implementation[10] selected for Google's post-quantum experiment,[11] uses Peikert's scheme with variation in the error distribution.

Ring learning with errors signature (RLWE-SIG)

[edit]
Main article:Ring learning with errors signature

A RLWE version of the classicFeige–Fiat–Shamir Identification protocol was created and converted to adigital signature in 2011 by Lyubashevsky. The details of this signature were extended in 2012 by Gunesyu, Lyubashevsky, and Popplemann in 2012 and published in their paper "Practical Lattice Based Cryptography – A Signature Scheme for Embedded Systems." These papers laid the groundwork for a variety of recent signature algorithms some based directly on the ring learning with errors problem and some which are not tied to the same hard RLWE problems.

See also

[edit]

References

[edit]
  1. ^abRegev, Oded (2009). "On lattices, learning with errors, random linear codes, and cryptography".Journal of the ACM.56 (6):1–40.arXiv:2401.03703.doi:10.1145/1568318.1568324.S2CID 207156623.
  2. ^Lyubashevsky, Vadim; Peikert, Chris; Regev, Oded (November 2013)."On Ideal Lattices and Learning with Errors over Rings".Journal of the ACM.60 (6):1–35.doi:10.1145/2535925.ISSN 0004-5411.S2CID 1606347.
  3. ^abcdefghOded Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Baltimore, MD, USA: ACM, 2005), 84–93,http://portal.acm.org/citation.cfm?id=1060590.1060603.
  4. ^abcdefChris Peikert, “Public-key cryptosystems from the worst-case shortest vector problem: extended abstract,” in Proceedings of the 41st annual ACM symposium on Theory of computing (Bethesda, MD, USA: ACM, 2009), 333–342,http://portal.acm.org/citation.cfm?id=1536414.1536461.
  5. ^Peikert, Chris (2014-10-01). "Lattice Cryptography for the Internet". In Mosca, Michele (ed.).Post-Quantum Cryptography. Lecture Notes in Computer Science. Vol. 8772. Springer International Publishing. pp. 197–219.CiteSeerX 10.1.1.800.4743.doi:10.1007/978-3-319-11659-4_12.ISBN 978-3-319-11658-7.S2CID 8123895.
  6. ^Chris Peikert and Brent Waters, “Lossy trapdoor functions and their applications,” in Proceedings of the 40th annual ACM symposium on Theory of computing (Victoria, British Columbia, Canada: ACM, 2008), 187-196,http://portal.acm.org/citation.cfm?id=1374406.
  7. ^Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan, “Trapdoors for hard lattices and new cryptographic constructions,” in Proceedings of the 40th annual ACM symposium on Theory of computing (Victoria, British Columbia, Canada: ACM, 2008), 197-206,http://portal.acm.org/citation.cfm?id=1374407.
  8. ^Lin, Jintai Ding, Xiang Xie, Xiaodong (2012-01-01)."A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem".Cryptology ePrint Archive.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  9. ^Peikert, Chris (2014-01-01)."Lattice Cryptography for the Internet".Cryptology ePrint Archive.
  10. ^Alkim, Erdem; Ducas, Léo; Pöppelmann, Thomas; Schwabe, Peter (2015-01-01)."Post-quantum key exchange - a new hope".Cryptology ePrint Archive.
  11. ^"Experimenting with Post-Quantum Cryptography".Google Online Security Blog. Retrieved2017-02-08.
Number theoretic
Group theoretic
Pairings
Lattices
Non-cryptographic
Retrieved from "https://en.wikipedia.org/w/index.php?title=Learning_with_errors&oldid=1321958564"
Category:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp