LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme
نویسندگان
چکیده
The LLL algorithm, named after its inventors, Lenstra, Lenstra and Lovász, is one of themost popular lattice reduction algorithms in the literature. In this paper, we propose the first variant of LLL algorithm that is dedicated for ideal lattices, namely, the iLLL algorithm. Our iLLL algorithm takes advantage of the fact that within LLL procedures, previously reduced vectors can be re-used for further reductions. Using this method, we prove that the iLLL is at least as fast as the LLL algorithm, and it outputs a basis with the same quality. We also provide a heuristic approach that accelerates the re-use method. As a result, in practice, our algorithm can be approximately eight times faster than LLL algorithm for typical scenarios where lattice dimension is between 100 and 150. When applying our algorithm to the Gentry–Halevi’s fully homomorphic challenges, we are able to solve the toy challenge within 24 days using a 2.66GHz CPU, while with the classical LLL algorithm, it takes 32 days. Further, assuming a 4.0GHz CPU, we predict to reduce the basis in 15.7 years for the small challenges, while previous best prediction was 45 years.
منابع مشابه
Accelerating Cryptosystems on Hardware Platforms
In the past decade, one of the major breakthroughs in computer science theory is the rst construction of fully homomorphic encryption (FHE) scheme introduced by Gentry. Using a FHE one may perform an arbitrary numbers of computations directly on the encrypted data without revealing of the secret key. Thus an untrusted party, such as a remotely hosted server, may perform computations on the data...
متن کاملAn Efficient Symmetric Based Algorithm for Data Security in Cloud Computing Through Homomorphic Encryption Scheme
The outstanding research topic on cryptography is called Fully Homomorphic Encryption (FHE), which allows computations to be carried out on encrypted data to the untrusted server of the security and privacy concerned related to emerging technologies like cloud computing. Various FHE schemes were developed after the first invention of Craig Gentry in 2009 which security is relying on bootstrappi...
متن کاملToward Basing Fully Homomorphic Encryption on Worst-Case Hardness
Gentry proposed a fully homomorphic public key encryption scheme that uses ideal lattices. He based the security of his scheme on the hardness of two problems: an average-case decision problem over ideal lattices, and the sparse (or “low-weight”) subset sum problem (SSSP). We provide a key generation algorithm for Gentry’s scheme that generates ideal lattices according to a “nice” average-case ...
متن کاملObfuscating Many-to-one Functional Re-encryption, and its Connection to Fully-Homomorphic Encryption
Following up on its first construction by Gentry (STOC 2009), fully-homomorphic encryption (FHE) has generated a multitude of different works, seeking both for new theoretical approaches as well as for more efficient instantiations. All existing FHE schemes, however, are tightly connected to specific assumptions, and no generic constructions are known. In this paper, we investigate generic cons...
متن کاملCryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption
For the fully homomorphic encryption schemes in [SV10, GH11], this paper presents attacks to solve equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by using lattice reduction algorithm. According to the average-case behavior of LLL in [NS06], their schemes are also not secure for n=8192.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 76 شماره
صفحات -
تاریخ انتشار 2015