LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme

نویسندگان

  • Thomas Plantard
  • Willy Susilo
  • Zhenfei Zhang
چکیده

The LLL algorithm, named after its inventors, Lenstra, Lenstra and Lovász, is one of themost popular lattice reduction algorithms in the literature. In this paper, we propose the first variant of LLL algorithm that is dedicated for ideal lattices, namely, the iLLL algorithm. Our iLLL algorithm takes advantage of the fact that within LLL procedures, previously reduced vectors can be re-used for further reductions. Using this method, we prove that the iLLL is at least as fast as the LLL algorithm, and it outputs a basis with the same quality. We also provide a heuristic approach that accelerates the re-use method. As a result, in practice, our algorithm can be approximately eight times faster than LLL algorithm for typical scenarios where lattice dimension is between 100 and 150. When applying our algorithm to the Gentry–Halevi’s fully homomorphic challenges, we are able to solve the toy challenge within 24 days using a 2.66GHz CPU, while with the classical LLL algorithm, it takes 32 days. Further, assuming a 4.0GHz CPU, we predict to reduce the basis in 15.7 years for the small challenges, while previous best prediction was 45 years.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accelerating Cryptosystems on Hardware Platforms

In the past decade, one of the major breakthroughs in computer science theory is the rst construction of fully homomorphic encryption (FHE) scheme introduced by Gentry. Using a FHE one may perform an arbitrary numbers of computations directly on the encrypted data without revealing of the secret key. Thus an untrusted party, such as a remotely hosted server, may perform computations on the data...

متن کامل

An Efficient Symmetric Based Algorithm for Data Security in Cloud Computing Through Homomorphic Encryption Scheme

The outstanding research topic on cryptography is called Fully Homomorphic Encryption (FHE), which allows computations to be carried out on encrypted data to the untrusted server of the security and privacy concerned related to emerging technologies like cloud computing. Various FHE schemes were developed after the first invention of Craig Gentry in 2009 which security is relying on bootstrappi...

متن کامل

Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness

Gentry proposed a fully homomorphic public key encryption scheme that uses ideal lattices. He based the security of his scheme on the hardness of two problems: an average-case decision problem over ideal lattices, and the sparse (or “low-weight”) subset sum problem (SSSP). We provide a key generation algorithm for Gentry’s scheme that generates ideal lattices according to a “nice” average-case ...

متن کامل

Obfuscating Many-to-one Functional Re-encryption, and its Connection to Fully-Homomorphic Encryption

Following up on its first construction by Gentry (STOC 2009), fully-homomorphic encryption (FHE) has generated a multitude of different works, seeking both for new theoretical approaches as well as for more efficient instantiations. All existing FHE schemes, however, are tightly connected to specific assumptions, and no generic constructions are known. In this paper, we investigate generic cons...

متن کامل

Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption

For the fully homomorphic encryption schemes in [SV10, GH11], this paper presents attacks to solve equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by using lattice reduction algorithm. According to the average-case behavior of LLL in [NS06], their schemes are also not secure for n=8192.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 76  شماره 

صفحات  -

تاریخ انتشار 2015