Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)

被引:0
|
作者
Peikert, Chris [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic schemes based on lattices first emerged in the mid-1990s, and have developed rapidly in the past few years. At the outset, works in this area fell into two very distinct types: Heuristic proposals such as NTRU, which lacked any formal security justification but were very practical; Schemes building on Ajtai's breakthrough work, which were highly impractical but came with provable 'worst-case' security guarantees. More recently, the line between efficiency and rigorous security has been blurred significantly (though not yet obliterated completely). This talk will survey several examples of early proposals that lacked any rigorous security analysis - and in some cases, turned out to be completely insecure - but which later inspired theoretically sound and efficient solutions. Even better, these solutions have opened the door to unexpected and far more advanced cryptographic applications than were originally envisioned.
引用
收藏
页码:54 / 54
页数:1
相关论文
共 50 条
  • [21] Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    [J]. 2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 75 - 79
  • [22] Portable Implementation of Lattice-Based Cryptography Using JavaScript
    20161902341243
    [J]. (1) Graduate School of Mathematics, Kyushu University, Japan; (2) Institute of Mathematics for Industry, Kyushu University, Japan; (3) Department of Electrical Engineering, National Taiwan University, Taiwan; (4) KDDI Laboratories, Taiwan; (5) CREST, Japan Science and Technology Agency, Japan, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [23] Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
    Oder, Tobias
    Gueneysu, Tim
    Valencia, Felipe
    Khalid, Ayesha
    O'Neill, Maire
    Regazzoni, Francesco
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2016,
  • [24] TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
    Wan, Lipeng
    Zheng, Fangyu
    Li, Jingqiang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 249 - 269
  • [25] Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -
    Khalid, Ayesha
    Oder, Tobias
    Valencia, Felipe
    Neill, Maire O'
    Gueneysu, Tim
    Regazzoni, Francesco
    [J]. PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 365 - 370
  • [26] The implementation of polynomial multiplication for lattice-based cryptography: A survey
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Peng, Cong
    Luo, Min
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [27] Computational Differential Privacy from Lattice-Based Cryptography
    Valovich, Filipp
    Alda, Francesco
    [J]. NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 121 - 141
  • [28] Flexible NTT Accelerators for RLWE Lattice-based Cryptography
    Nejatollahi, Hamid
    Cammarota, Rosario
    Dutt, Nikil
    [J]. 2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 329 - 332
  • [29] On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Rafferty, Ciara
    Regazzoni, Francesco
    O'Neill, Maire
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 322 - 334
  • [30] Physical Layer Cryptography in Optical Networks: A Lattice-Based Approach
    Boudriga, Noureddine
    Abdallah, Walid
    Hamdi, Mohamed
    [J]. 2010 12TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,