Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)

被引:0
|
作者
Peikert, Chris [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic schemes based on lattices first emerged in the mid-1990s, and have developed rapidly in the past few years. At the outset, works in this area fell into two very distinct types: Heuristic proposals such as NTRU, which lacked any formal security justification but were very practical; Schemes building on Ajtai's breakthrough work, which were highly impractical but came with provable 'worst-case' security guarantees. More recently, the line between efficiency and rigorous security has been blurred significantly (though not yet obliterated completely). This talk will survey several examples of early proposals that lacked any rigorous security analysis - and in some cases, turned out to be completely insecure - but which later inspired theoretically sound and efficient solutions. Even better, these solutions have opened the door to unexpected and far more advanced cryptographic applications than were originally envisioned.
引用
收藏
页码:54 / 54
页数:1
相关论文
共 50 条
  • [31] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Martinoli, Marco
    Regazzoni, Francesco
    Oswald, Elisabeth
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [32] Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
    Gueneysu, Tim
    Lyubashevsky, Vadim
    Poeppelmann, Thomas
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 530 - 547
  • [33] Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    Lee, Cheng-Chi
    [J]. MATHEMATICS, 2021, 9 (14)
  • [34] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Hamid Nejatollahi
    Sina Shahhosseini
    Rosario Cammarota
    Nikil Dutt
    [J]. Journal of Signal Processing Systems, 2021, 93 : 1139 - 1148
  • [35] Performance Analysis of Number Theoretic Transform for Lattice-Based Cryptography
    Mohsen, Ayman W.
    Sobh, Mohamed A.
    Bahaa-Eldin, Ayman M.
    [J]. PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2018, : 442 - 447
  • [36] Portable Implementation of Lattice-based Cryptography using Java']JavaScript
    Yuan, Ye
    Cheng, Chen-Mou
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Takagi, Tsuyoshi
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 58 - 67
  • [37] Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography
    Chen Z.
    Ma Y.
    Jing J.
    [J]. Ma, Yuan (mayuan@iie.ac.cn), 2021, Peking University (57): : 595 - 604
  • [38] Towards Efficient Discrete Gaussian Sampling for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    [J]. 2015 25TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2015,
  • [39] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Nejatollahi, Hamid
    Shahhosseini, Sina
    Cammarota, Rosario
    Dutt, Nikil
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (10): : 1139 - 1148
  • [40] Attacking and defending masked polynomial comparison for lattice-based cryptography
    Bhasin S.
    D’anvers J.-P.
    Heinz D.
    Pöppelmann T.
    Van Beirendonck M.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 334 - 359