Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus

被引:9
|
作者
Kim, Sam [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
关键词
CONSTRUCTION; ENCRYPTION; SECURITY;
D O I
10.1007/978-3-030-45724-2_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pseudorandom functions (PRFs) are fundamental objects in cryptography that play a central role in symmetric-key cryptography. Although PRFs can be constructed from one-way functions generically, these black-box constructions are usually inefficient and require deep circuits to evaluate compared to direct PRF constructions that rely on specific algebraic assumptions. From lattices, one can directly construct PRFs from the Learning with Errors (LWE) assumption (or its ring variant) using the result of Banerjee, Peikert, and Rosen (Eurocrypt 2012) and its subsequent works. However, all existing PRFs in this line of work rely on the hardness of the LWE problem where the associated modulus is super-polynomial in the security parameter. In this work, we provide two new PRF constructions from the LWE problem. In each of these constructions, each focuses on either minimizing the depth of its evaluation circuit or providing key-homomorphism while relying on the hardness of the LWE problem with either a polynomial modulus or nearly polynomial modulus. Along the way, we introduce a new variant of the LWE problem called the Learning with Rounding and Errors (LWRE) problem. We show that for certain settings of parameters, the LWRE problem is as hard as the LWE problem. We then show that the hardness of the LWRE problem naturally induces a pseudorandom synthesizer that can be used to construct a low-depth PRF. The techniques that we introduce to study the LWRE problem can then be used to derive variants of existing key-homomorphic PRFs whose security can be reduced from the hardness of the LWE problem with a much smaller modulus.
引用
收藏
页码:576 / 607
页数:32
相关论文
共 50 条
  • [41] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS
    LUBY, M
    RACKOFF, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 447 - 447
  • [42] Public-Key Watermarking Schemes for Pseudorandom Functions
    Yang, Rupeng
    Yu, Zuoxia
    Au, Man Ho
    Susilo, Willy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 637 - 667
  • [43] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS
    LUBY, M
    RACKOFF, C
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 373 - 386
  • [44] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM SINGLE PSEUDORANDOM FUNCTIONS
    PIEPRZYK, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 140 - 150
  • [45] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
    Kang, Ju-Sung
    Kim, Nayoung
    Ju, Wangho
    Yi, Ok-Yeon
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
  • [46] Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
    Coron, Jean-Sebastien
    Naccache, David
    Tibouchi, Mehdi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 446 - 464
  • [47] Multi-key FHE from LWE, Revisited
    Peikert, Chris
    Shiehian, Sina
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 217 - 238
  • [48] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 77 - 94
  • [49] An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 388 - 409
  • [50] Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
    Michel Abdalla
    Fabrice Benhamouda
    Alain Passelègue
    Kenneth G. Paterson
    Journal of Cryptology, 2018, 31 : 917 - 964