Chris Peikert – Research Statement

نویسنده

  • Chris Peikert
چکیده

My research is dedicated to developing new, stronger mathematical foundations for cryptography, with a particular focus on geometric objects called lattices. Informally, a lattice is a periodic ‘grid’ of points in n-dimensional real space Rn. Lattices have been studied since the early 1800s, and their apparent simplicity belies many deep connections and applications across mathematics, physics, and computer science. In cryptography, the security of most systems necessarily relies upon computational problems that are conjectured to be intractable, i.e., infeasible to solve with any realistic amount of computational resources. Over the past three decades, the most useful candidate hard problems have come from an area of mathematics called number theory. For instance, a commonly made conjecture is that it is infeasible to compute the prime factors of huge random integers. However, the relatively high computational cost, and largely sequential nature, of operating on such enormous numbers inherently limits the efficiency and applicability of numbertheoretic cryptography. Even more worrisome is that quantum algorithms, which work in a model of computation that exploits quantum mechanics to dramatically speed up certain kinds of computations, can efficiently solve all the number-theoretic problems commonly used in cryptography! Therefore, the future development of a practical, large-scale quantum computer would be devastating to the security of today’s cryptographic systems. Alternative foundations are therefore sorely needed. The seminal works of Ajtai [Ajt96] and Ajtai-Dwork [AD97] in the mid-1990s used conjectured hard problems on lattices as a basis for cryptography. Since then, it has been broadly recognized that lattices have the potential to yield cryptographic schemes with unique and attractive security guarantees—including “worst-case” hardness (explained in the next section) and resistance to quantum attacks—and high levels of asymptotic efficiency and parallelism. However, until 2007 only a few very basic lattice-based objects (having limited applicability) were known, and in practice they were very inefficient and so mainly of theoretical interest. Over the past several years, my research has contributed ground-breaking progress toward realizing the full potential of lattices in cryptography, by (1) strengthening the theoretical foundations of the area, (2) designing new cryptographic constructions that enjoy rich functionality and strong security properties, and (3) making lattice cryptography efficient and practical via new design paradigms, fast algorithms, and optimized implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Statement Chris Peikert December 22 , 2008 1 New Foundations for Cryptography

Most cryptographic tasks must inherently rely on assumptions about the difficulty of some computational problem. Over the past three decades, number theory has served as the primary source of seemingly hard problems for cryptography; for instance, a prototypical conjecture is that it is infeasible to factor the product of two large, random prime numbers. Many such number-theoretic problems have...

متن کامل

Foundations of Cryptography Georgia Tech , Spring 2010 Lecture 16 Zero - Knowledge Proofs Instructor

1 Recap: Interactive Proofs Definition 1.1. An interactive proof system with soundness error s ∈ [0, 1] for a language L ⊆ {0, 1} * is a pair of algorithms: a (possibly computationally unbounded) prover P , and a ppt verifier V , having the following properties: 1. Completeness (" the specified prover convinces the specified verifier of a true statement "): for all x ∈ L, out V [P (x) ↔ V (x)] ...

متن کامل

Lecture 4 Coppersmith, Cryptanalysis

In the theorem statement and what follows, for simplicity of analysis we use ≈ to hide factors which are polynomial in d and N ε for some arbitrarily small constant ε > 0.1 The remainder of this section is dedicated to the proof of the theorem. Last time we considered adding multiples of N · xi to f(x), which preserves the roots of f(x) modulo N . But this only let us obtain a bound of B ≈ N2/d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014