Symbolic Proofs for Lattice-Based Cryptography

被引:8
|
作者
Barthe, Gilles [1 ]
Fan, Xiong [2 ]
Gancher, Joshua [2 ]
Gregoire, Benjamin [3 ]
Jacomme, Charlie [4 ,5 ,6 ,7 ,8 ]
Shi, Elaine [2 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Cornell Univ, Ithaca, NY USA
[3] INRIA, Sophia Antipolis, France
[4] LSV, Cachan, France
[5] CNRS, Paris, France
[6] ENS Paris Saclay, Cachan, France
[7] INRIA, Grenoble, France
[8] Univ Paris Saclay, Paris, France
基金
美国国家科学基金会;
关键词
Symbolic proofs; provable security; lattice-based cryptography; SECURITY; ENCRYPTION; PROTOCOLS; DECISION;
D O I
10.1145/3243734.3243825
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Symbolic methods have been used extensively for proving security of cryptographic protocols in the Dolev-Yao model, and more recently for proving security of cryptographic primitives and constructions in the computational model. However, existing methods for proving security of cryptographic constructions in the computational model often require significant expertise and interaction, or are fairly limited in scope and expressivity. This paper introduces a symbolic approach for proving security of cryptographic constructions based on the Learning With Errors assumption (Regev, STOC 2005). Such constructions are instances of lattice-based cryptography and are extremely important due to their potential role in post-quantum cryptography. Following (Barthe, Gregoire and Schmidt, CCS 2015), our approach combines a computational logic and deducibility problems-a standard tool for representing the adversary's knowledge, the Dolev-Yao model. The computational logic is used to capture (indistinguishability-based) security notions and drive the security proofs whereas deducibility problems are used as side-conditions to control that rules of the logic are applied correctly. We then use AutoLWE, an implementation of the logic, to deliver very short or even automatic proofs of several emblematic constructions, including CPA-PKE (Gentry et al., STOC 2008), (Hierarchical) Identity-Based Encryption (Agrawal et al. Eurocrypt 2010), Inner Product Encryption (Agrawal et al. Asiacrypt 2011), CCA-PKE (Micciancio et al., Eurocrypt 2012). The main technical novelty beyond AutoLWE is a set of (semi-) decision procedures for deducibility problems, using extensions of Grobner basis computations for subalgebras in the (non-) commutative setting (instead of ideals in the commutative setting). Our procedures cover the theory of matrices, which is required for lattice-based assumption, as well as the theory of non-commutative rings, fields, and Diffie-Hellman exponentiation, in its standard, bilinear and multilinear forms. Additionally, AutoLWE supports oracle-relative assumptions, which are used specifically to apply (advanced forms of) the Leftover Hash Lemma, an information-theoretical tool widely used in lattice-based proofs.
引用
收藏
页码:538 / 555
页数:18
相关论文
共 50 条
  • [1] Lattice-based cryptography
    Regev, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [2] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [3] Lattice-Based Cryptography: A Survey
    Wang, Xiaoyun
    Xu, Guangwu
    Yu, Yang
    [J]. CHINESE ANNALS OF MATHEMATICS SERIES B, 2023, 44 (06) : 945 - 960
  • [4] Lattice-Based Cryptography:A Survey
    Xiaoyun WANG
    Guangwu XU
    Yang YU
    [J]. Chinese Annals of Mathematics,Series B, 2023, (06) : 945 - 960
  • [5] Lattice-Based Cryptography: A Survey
    Xiaoyun Wang
    Guangwu Xu
    Yang Yu
    [J]. Chinese Annals of Mathematics, Series B, 2023, 44 : 945 - 960
  • [6] Proof of a Shuffle for Lattice-Based Cryptography
    Costa, Nuria
    Martinez, Ramiro
    Morillo, Paz
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 280 - 296
  • [7] Power Analysis Attacks for Lattice-Based Cryptography
    Li, Yan-Bin
    Zhu, Jia-Jie
    Tang, Ming
    Zhang, Huan-Guo
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 331 - 352
  • [8] Improved Security Proofs in Lattice-Based Cryptography: Using the Renyi Divergence Rather Than the Statistical Distance
    Bai, Shi
    Langlois, Adeline
    Lepoint, Tancrede
    Stehle, Damien
    Steinfeld, Ron
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 3 - 24
  • [9] Some Recent Progress in Lattice-Based Cryptography
    Peikert, Chris
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 72 - 72
  • [10] Preface to special topic on lattice-based cryptography
    Yu Yu
    [J]. National Science Review, 2021, 8 (09) : 6 - 6