Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic Encryption
后量子密码学和全同态加密的错误学习的比特安全性
基本信息
- 批准号:EP/P009417/1
- 负责人:
- 金额:$ 10.22万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Research Grant
- 财政年份:2017
- 资助国家:英国
- 起止时间:2017 至 无数据
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
LWE can be summarised as: given a matrix `A` and a vector `b` modulo `q`, decide if `b` is uniform or if `b = A * s + e` for some small error `e`. Hence, the problem is essentially to solve a noisy linear system of equations modulo `q`. It was shown by Regev that this problem is as hard as assumed-to-be-hard problems. The problem has become a central building block of modern cryptographic constructions.1. Modern cybersecurity relies on cryptographic algorithms such as RSA encryption and digital signatures as well as the Diffie-Hellman key exchange. It is well-known that the hard mathematical problems underlying these algorithms can be solved efficiently on a quantum computer. While the advent of quantum computers has been promised many times before, recent developments in the area have convinced many actors, especially those with a long-term security mission, to actively seek alternative algorithms which promise post-quantum security. As a result, post-quantum cryptography has recently developed from a niche area of cryptography to a mainstream concern. With the American standards body NIST announcing it would hold a competition for post-quantum proposals, the field is posed to become a central area of cryptographic research in the coming years. LWE is one of the central candidates for a hard problem withstanding attacks using quantum computers and first proposals for key exchange algorithms for Internet communication based on LWE are available.2. Fully homomorphic encryption, the ability to compute with encrypted data, has progressed considerably since a first solution was proposed in Gentry's seminal work. The most recent generation of such schemes have become efficient enough to the point that first prototype applications, such as privacy-preserving computations with genome data, are being developed. All such constructions rely on the difficulty of solving LWE.While it is encouraging to have Regev's proof that solving LWE is no easier than solving problems widely believed to be hard as we increase parameters, this does not settle the question of how big we should choose our parameters to provide security against real world attacks. The purpose of this project is to provide more refined answers to this question, allowing us to rely on LWE with more confidence.
可以将LWE概述为:给定矩阵`a`和vector`B` modulo` q',确定`b`是否均匀,或者是否b = a * s + e`对于某些小错误`因此,问题本质上是解决方程式嘈杂的线性系统模型`q'。 Regev表明,这个问题与假定的问题一样困难。这个问题已成为现代加密结构的中心基础。1。现代网络安全依赖于加密算法,例如RSA加密和数字签名以及Diffie-Hellman密钥交换。众所周知,这些算法的基础数学问题可以在量子计算机上有效解决。虽然量子计算机的出现之前已经承诺了多次,但该地区的最新发展使许多演员,尤其是那些具有长期安全任务的演员,都积极寻求替代算法,这些算法承诺后量化后的安全性。结果,量词后密码学最近从密码学的利基区域发展到主流关注点。随着美国标准机构NIST宣布将举办量词后提案的竞争,该领域被认为是未来几年的密码研究的中心领域。 LWE是使用Quantum Computers进行攻击的严重问题的中心候选人之一,并且可以提供基于LWE的Internet通信的钥匙交换算法的第一个建议。2。自从绅士的开创性工作中提出了第一个解决方案以来,完全使用加密数据计算的能力是完全同态加密的。最近一代这样的方案已经变得足够有效,以至于开发了第一个原型应用程序,例如使用基因组数据进行隐私的计算。所有这些结构都依赖于解决LWE的困难。尽管有Regev的证据证明,解决LWE的证据不比解决问题广泛地认为是困难的问题要容易得多,但这并不能解决我们应该如何选择参数以提供对现实世界攻击的安全性的问题。该项目的目的是为这个问题提供更精致的答案,使我们能够更有信心依靠LWE。
项目成果
期刊论文数量(10)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Implementing RLWE-based Schemes Using an RSA Co-Processor
- DOI:10.13154/tches.v2019.i1.169-208
- 发表时间:2018-11
- 期刊:
- 影响因子:0
- 作者:Martin R. Albrecht;Christian H. Hanser;Andrea Höller;T. Pöppelmann;Fernando Virdia;Andreas Wallner
- 通讯作者:Martin R. Albrecht;Christian H. Hanser;Andrea Höller;T. Pöppelmann;Fernando Virdia;Andreas Wallner
Breaking Bridgefy, again: Adopting libsignal is not enough
再次破坏 Bridgefy:采用 libsignal 还不够
- DOI:
- 发表时间:2022
- 期刊:
- 影响因子:0
- 作者:Albrecht M.R.
- 通讯作者:Albrecht M.R.
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Martin Albrecht其他文献
Towards a sustainable grid development regime? A comparison of British, Norwegian, and Swedish grid development
走向可持续的电网发展体制?
- DOI:
- 发表时间:
2015 - 期刊:
- 影响因子:0
- 作者:
H. Sataøen;O. Brekke;S. Batel;Martin Albrecht - 通讯作者:
Martin Albrecht
Hypoxia-induced cell damage is reduced by mild hypothermia and postconditioning with catalase <em>in-vitro</em>: Application of an enzyme based oxygen deficiency system
- DOI:
10.1016/j.ejphar.2009.11.023 - 发表时间:
2010-02-25 - 期刊:
- 影响因子:
- 作者:
Karina Zitta;Patrick Meybohm;Berthold Bein;Cornelia Rodde;Markus Steinfath;Jens Scholz;Martin Albrecht - 通讯作者:
Martin Albrecht
On the nature and temperature dependence of the fundamental band gap of In2O3
In2O3 基本带隙的性质和温度依赖性
- DOI:
- 发表时间:
2014 - 期刊:
- 影响因子:0
- 作者:
K. Irmscher;M. Naumann;Mike Pietsch;Z. Galazka;Reinhard Uecker;T. Schulz;R. Schewski;Martin Albrecht;Roberto Fornari - 通讯作者:
Roberto Fornari
Switchable iridium hydride catalysts for controlling selectivity of alcohol oxidation
- DOI:
10.1016/j.jorganchem.2020.121290 - 发表时间:
2020-08-01 - 期刊:
- 影响因子:
- 作者:
Marta Olivares;Martin Albrecht - 通讯作者:
Martin Albrecht
Cryptography and Coding: 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
密码学与编码:第 17 届 IMA 国际会议,IMACC 2019,英国牛津,2019 年 12 月 16-18 日,会议记录
- DOI:
10.1007/978-3-030-35199-1 - 发表时间:
2019 - 期刊:
- 影响因子:0
- 作者:
Martin Albrecht - 通讯作者:
Martin Albrecht
Martin Albrecht的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Martin Albrecht', 18)}}的其他基金
Social Foundations of Cryptography
密码学的社会基础
- 批准号:
EP/X017524/1 - 财政年份:2024
- 资助金额:
$ 10.22万 - 项目类别:
Research Grant
APPQC: Advanced Practical Post-Quantum Cryptography From Lattices
APPQC:来自格的高级实用后量子密码学
- 批准号:
EP/Y02432X/1 - 财政年份:2024
- 资助金额:
$ 10.22万 - 项目类别:
Research Grant
相似国自然基金
多无人机协同环航目标跟踪的安全学习优化控制研究
- 批准号:62303480
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
面向人机安全的多机器人强化学习协调控制研究
- 批准号:62303357
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
基于联邦学习和区块链的物联网安全可信数据共享理论与技术研究
- 批准号:62366004
- 批准年份:2023
- 资助金额:32 万元
- 项目类别:地区科学基金项目
时序变化图像中工人不安全状态的场景-要素耦合机理、知识建模及自学习感知算法
- 批准号:52308314
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
安全与隐私保护的联邦学习全生命周期管理研究
- 批准号:62302164
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
Deep Learningを活用した超音波ガイドによる安全な静脈穿刺法の開発
利用深度学习的超声引导开发安全静脉穿刺方法
- 批准号:
24K13362 - 财政年份:2024
- 资助金额:
$ 10.22万 - 项目类别:
Grant-in-Aid for Scientific Research (C)
Security and compilers for machine learning
机器学习的安全性和编译器
- 批准号:
2906291 - 财政年份:2024
- 资助金额:
$ 10.22万 - 项目类别:
Studentship
Climate Change Effects on Pregnancy via a Traditional Food
气候变化通过传统食物对怀孕的影响
- 批准号:
10822202 - 财政年份:2024
- 资助金额:
$ 10.22万 - 项目类别:
Trustworthy decentralized AI for large-scale IoT representation learning
用于大规模物联网表征学习的值得信赖的去中心化人工智能
- 批准号:
22KJ0878 - 财政年份:2023
- 资助金额:
$ 10.22万 - 项目类别:
Grant-in-Aid for JSPS Fellows
Security Evaluation Method Against Deep-Learning-Based Side-Channel Attacks Exploiting Physical Behavior of Cryptographic Hardware
针对利用密码硬件物理行为的基于深度学习的侧信道攻击的安全评估方法
- 批准号:
23K11102 - 财政年份:2023
- 资助金额:
$ 10.22万 - 项目类别:
Grant-in-Aid for Scientific Research (C)