The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings |
| |
Authors: | Jheyne N. Ortiz Robson R. de Araujo Diego F. Aranha Sueli I. R. Costa Ricardo Dahab |
| |
Affiliation: | 1.Institute of Computing, University of Campinas, Campinas 13083-852, Brazil;2.Federal Institute of São Paulo, Cubatão 11533-160, Brazil;3.Department of Computer Science, Aarhus University, N 8200 Aarhus, Denmark;4.Institute of Mathematics, Statistics and Computing Science, University of Campinas, Campinas 13083-859, Brazil; |
| |
Abstract: | Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring instantiations enlarges the scope of possible applications and favors the diversification of security assumptions. In this work, we extend the Ring-LWE problem in lattice-based cryptography to include algebraic lattices, realized through twisted embeddings. We define the class of problems Twisted Ring-LWE, which replaces the canonical embedding by an extended form. By doing so, we allow the Ring-LWE problem to be used over maximal real subfields of cyclotomic number fields. We prove that Twisted Ring-LWE is secure by providing a security reduction from Ring-LWE to Twisted Ring-LWE in both search and decision forms. It is also shown that the twist factor does not affect the asymptotic approximation factors in the worst-case to average-case reductions. Thus, Twisted Ring-LWE maintains the consolidated hardness guarantee of Ring-LWE and increases the existing scope of algebraic lattices that can be considered for cryptographic applications. Additionally, we expand on the results of Ducas and Durmus (Public-Key Cryptography, 2012) on spherical Gaussian distributions to the proposed class of lattices under certain restrictions. As a result, sampling from a spherical Gaussian distribution can be done directly in the respective number field while maintaining its format and standard deviation when seen in via twisted embeddings. |
| |
Keywords: | lattice-based cryptography, twisted embeddings, ring learning with errors, spherical Gaussian sampling, ℤ n-equivalent lattices |
|
|