Abstract
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring instantiations enlarges the scope of possible applications and favors the diversification of security assumptions. In this work, we extend the Ring-LWE problem in lattice-based cryptography to include algebraic lattices, realized through twisted embeddings. We define the class of problems Twisted Ring-LWE, which replaces the canonical embedding by an extended form. By doing so, we allow the Ring-LWE problem to be used over maximal real subfields of cyclotomic number fields. We prove that Twisted Ring-LWE is secure by providing a security reduction from Ring-LWE to Twisted Ring-LWE in both search and decision forms. It is also shown that the twist factor does not affect the asymptotic approximation factors in the worst-case to average-case reductions. Thus, Twisted Ring-LWE maintains the consolidated hardness guarantee of Ring-LWE and increases the existing scope of algebraic lattices that can be considered for cryptographic applications. Additionally, we expand on the results of Ducas and Durmus (Public-Key Cryptography, 2012) on spherical Gaussian distributions to the proposed class of lattices under certain restrictions. As a result, sampling from a spherical Gaussian distribution can be done directly in the respective number field while maintaining its format and standard deviation when seen in via twisted embeddings.
Keywords: lattice-based cryptography, twisted embeddings, ring learning with errors, spherical Gaussian sampling, ℤn-equivalent lattices
1. Introduction
Lattice-based cryptography comprehends the class of cryptosystems whose security is based on the conjectured intractability of hard lattice problems such as the Shortest Independent Vectors Problem (SIVP), the Shortest Vector Problem (SVP), and the Closest Vector Problem (CVP) [1,2]. The main computational problem in the foundation of most modern lattice-based cryptosystems is Learning with Errors (LWE) [3]. Since its introduction in the cryptographic realm in 2005, algebraically structured variants have been proposed, such as Learning with Errors over Rings [4], denoted Ring-LWE, and Module-LWE [5,6,7], among others [8].
Although the Ring-LWE hardness results hold for any number field [4,9], its most used instantiation in lattice-based cryptosystems is over power-of-two cyclotomic number fields, as evidenced by the finalists of NIST’s Post-Quantum Cryptography standardization effort [10]. This choice of a number field is particularly interesting because its ring of integers is isomorphic to the polynomial ring , for n a power of two. The fact that is maximally sparse allows efficient polynomial multiplication using the number-theoretic transform combined with the negacyclic convolution. In addition to that, the transformation from the ring R to its dual, denoted , is a simple scaling of the form , allowing applications to work directly on R, with no loss in their underlying worst-case hardness guarantees [4].
Another advantage of power-of-two cyclotomic number fields is that the sampling of error terms can be performed directly in the ring R considering a power basis, since the transformation to the associated vector subspace H isomorphic to is just a rigid rotation followed by scaling. For other choices of cyclotomic fields, sampling from a spherical Gaussian distribution can be done in an extended ring and performing a reduction modulo the cyclotomic polynomial , which leads to the desired spherical distribution in the canonical embedding [11]. For general number fields, the best option in terms of security still is a sampling from an error distribution in H and computing the inverse transformation with respect to the canonical embedding [4,12].
There are several works in the literature exploring properties of number fields used in the foundation of some cryptosystems based on ideal lattices. An example is a quantum polynomial-time algorithm to find a small generator of a principal ideal in the ring of algebraic integers of cyclotomic rings [13], which applies to a few schemes including the fully-homomorphic encryption scheme of Smart and Vercauteren [14]. Moreover, a sequence of works has characterized weak instances of Ring-LWE and Poly-LWE problems and proposed attacks using special properties for specific parameters [15,16,17,18,19,20,21,22,23,24]. Another motivation for searching for alternative number fields is the inflexibility of system parameters that grow as a power-of-two. In such cryptosystems, when it is required to increase the security level, it may be necessary to increase the lattice dimension which implies doubling its size. However, a more suitable dimension could be a value much smaller than the next power of two. In fact, a ring dimension ranging from 700 to 800 suffices for 128-bit security [25].
Although these weak instances are not addressed by worst-case hardness theorems [26], new proposals adopting non-conventional rings have emerged as alternatives, thus favoring the diversification of security assumptions. For NTRU-based schemes, examples are the NTTRU [27], the third-round NTRU submission [28] in the NIST Post-Quantum Cryptography contest [10], and NTRU Prime [29]. For Ring-LWE, the instantiations have been restricted to cyclotomic number fields. Lyubashevsky, Peikert, and Regev introduced a toolkit with techniques for secure implementation of Ring-LWE primitives over any cyclotomic number field [12], allowing applications to work on cyclotomic rings with non-power-of-two dimension. Later on, this toolkit was implemented in software in two distinct libraries [30,31]. An alternative instantiation could be the adoption of the polynomial ring for p prime, which was proposed for NTRU Prime [29], and suggested for the Ring-LWE setting [32]. In this sense, we conjecture whether the Ring-LWE problem could be parameterized by number fields other than the cyclotomic for cryptographic applications.
1.1. Contributions
In this context, we extend the Ring-LWE class of problems to embrace more general algebraic constructions of lattices which allow additional factors on the embedding coordinates. We replace the canonical embedding by twisted embeddings. Since the canonical embedding is a special case of twisted embeddings, this replacement maintains the consolidated results for Ring-LWE. Twisted embeddings have been useful in coding theory, since they allow the construction of algebraic lattices with improved properties for Rayleigh fading channels, providing high density, maximum diversity, and great minimum product distance [33,34,35].
We extend the Ring-LWE problem by replacing the canonical embedding with twisted embeddings on both the search and decision variants. As a result, we obtain the Twisted Ring-LWE problem, in which the error terms are sampled in the space H isomorphic to under the inner product induced by a twisted embedding. We show that Twisted Ring-LWE is at least as secure as Ring-LWE through a security reduction from Ring-LWE to Twisted Ring-LWE. We also recomputed the approximation factors in the worst-case to average-case reductions from hard lattice problems taking into account the new twist factor.
As a result, algebraic constructions from coding theory via twisted embeddings can also be used in cryptographic applications based on the Ring-LWE problem. In this work, we focused our attention on the algebraic construction of rotated -lattices via twisted embeddings. Ducas and Durmus [11] showed that a spherical Gaussian distribution in the ring , where if m is odd, and if m is even, corresponds to a distribution with the same format in the space H, but linearly wider in the ring dimension. This occurs because the lattice obtained from the ring is a rotated -lattice in the canonical embedding. The same holds for the ring of integers of a power-of-two cyclotomic number field. Thus, we generalize this result of Ducas and Durmus by showing that if the parameter ring leads to a rotated -lattice under twisted embeddings, then both the format and the standard deviation of a spherical Gaussian distribution in is preserved when seen in H. Examples of ideal lattices equivalent to are those obtained from power-of-two cyclotomic number fields [36], and their maximal real subfields [37], and the maximal real subfields of p-th cyclotomic number fields. Since power-of-two cyclotomic rings have been widely used in cryptographic applications, we consider parameterizing the Ring-LWE problem with the ring of integers of the maximal real subfield of a cyclotomic number field. We discuss the limitations of using maximal real subfields in a public-key encryption scheme [12] using the polynomial representation in terms of the arithmetic operations and the expansion factor of the defining polynomial. However, we argue that these limitations could be circumvented by using the coefficient vector representation, as done in [12]. Finally, we also argue that twisted embeddings can be used as a tool to connect Ring-LWE instances over distinct rings, which may lead to a response to the open question left by Peikert, Regev, and Stephens-Davidowitz [9]. In fact, if the parameter rings generate the same algebraic lattice in the space H, their Ring-LWE instances can be efficiently converted between themselves.
1.2. Organization
This paper is organized as follows. Section 2 is devoted to the introduction of concepts and results on lattices and algebraic number theory to be used throughout the paper. In particular, Section 2.4 presents the original statement of the Ring-LWE problem in its search and decision variants, and also the computational problems which form the foundation of the (Ring)-LWE hardness.
Section 3 introduces the twisted embeddings and generalizes the class of Ring-LWE problems by adopting twisted embeddings. We prove that multiplying the coordinates of vectors in the canonical representation by a twisting factor does not affect the hardness of Ring-LWE. This is shown via a reduction from both search and decision versions of Ring-LWE to their corresponding twisted forms. Moreover, we compute the new approximation factors for the reduction from SIVP to DGS (Discrete Gaussian Sampling problem), and also for the reduction from DGS to Ring-LWE. Since the new approximation factors are simply multiplied by a scalar associated with the lattice dimension n, the asymptotic factors are not affected by the change of embeddings.
Section 4 extends to a more general class of number fields the results of Ducas and Durmus on spherical Gaussian sampling [11]. We show that correct noise sampling can be performed directly in the field representation of lattices equivalent to without any increase in the standard deviation. Section 4.1 discusses the practical impacts of instantiating the Ring-LWE problem over the ring of integers of the maximal real cyclotomic number field , where is a prime number. We analyze the main computational operations in the compact public-key cryptosystem of Lyubashevsky, Peikert, and Regev [12], and also the format of the ring’s defining polynomial in terms of the expansion factor. Finally, Section 5 discuss our results and highlight future research directions on the practical aspects of the Twisted Ring-LWE problem.
2. Preliminaries on Lattices and Algebraic Number Theory
In this section, we introduce concepts, results and notation to be used throughout the paper. For a positive integer number m, denote by the set . For , the -norm of a vector in or is , and the -norm is .
2.1. The Space H
Frequently, lattices are defined in the Euclidean space . However, in the Ring-LWE context [4,9], it is more convenient to define lattices in a specific subspace of isometric to : the space H.
Definition 1
(Space H). Let and be non-negative integer numbers such that . The subspace is defined as
We consider H endowed with the inner product obtained as a restriction of the standard inner product of :
The norm (usually -norm) of is defined as .
For , denote by the vector with all zero coordinates except for the i-th position, which is equal to one. We consider the canonical basis of (over ) and (over ). An orthonormal basis for H can be defined in terms of the canonical basis of :
Definition 2
(Canonical basis of H). Let and be non-negative integer numbers such that . For , define . For , define and . Then, the set is an orthonormal basis of H, which we call the canonical basis of H as an n-dimensional -vector space.
Notice that any vector can be written as an -linear combination of the vectors of the canonical basis of H as
where and denote the real and imaginary parts of a complex number, respectively.
The linear map , with , defines an isomorphism between the -vector spaces H and , such that , where denotes the standard inner product in . Then, it follows that H and are isometric, that is, H is an Euclidean space, as defined next. In particular, the norm of an element coincides with the usual norm (-norm) of , that is, .
2.2. Lattices in Euclidean Vector Spaces
An Euclidean vector space is an n-dimensional -vector space E with an inner product , which is isometric to with the standard inner product. Consider an orthonormal basis of E.
A set is said to be a full-rank lattice (or simply lattice), if is a discrete additive subgroup of E with rank n. Equivalently, is a lattice if there exists a set of linearly independent vectors such that
The set is called a basis (or a -basis) of . For each , it can be written in terms of the orthonormal basis as for .
The minimum distance of a lattice in the -norm, denoted , is the length of a shortest nonzero lattice vector, that is, . Similarly, for any , the k-th successive minimum of a lattice , denoted , is the smallest such that contains at least k linearly independent vectors of norm at most .
The matrix , for which the j-th column is given by the coefficients of written in the orthonormal basis , is called a generator matrix of . Two basis generate the same lattice if and only if the associated generator matrices and are related as , where is unimodular (has integer entries and ). The matrix is called the Gram matrix of with respect to . Since the basis of the Euclidean vector space is orthonormal, then . The determinant of is called the determinant of and is denoted by . Clearly, does not depend of a particular basis of .
The dual lattice of is the lattice and has generator matrix . It is known that and if has generator matrix , then is a generator matrix for and therefore .
A lattice is called integral if for all . Equivalently, is an integral lattice if and only if . An integral lattice is called unimodular, or self-dual, if or, equivalently, if .
Two lattices and are said to be equivalent if one can be obtained from the other through a rotation, a reflection, or a change of scale. We denote this equivalence by . Two Gram matrices and of two equivalent lattices and , respectively, are related as , where is a real constant and is unimodular.
We say that a lattice in is orthogonal if it has a basis such that if , for all . This means that has a diagonal Gram matrix. Moreover, if the basis satisfies if and if , for all and , then is equivalent to the -lattice. In this case, has a Gram matrix . In particular, when , we say that is an orthonormal lattice.
Gaussian Measures
For , define the Gaussian function centered at as
(1) |
The subscript is taken to be when omitted. By normalizing this function, we obtain the continuous Gaussian probability distribution of width r, whose density is given by .
We extend this definition to elliptical Gaussian distributions in (the canonical basis of H) as follows. Let be a vector of positive real numbers such that for each . Then, a sample from the n-dimensional distribution is given by , where the are chosen independently from the (one-dimensional) Gaussian distribution over .
The smoothing parameter is a lattice parameter defining the width beyond which a discrete Gaussian starts to behave similarly to a continuous distribution [38]. It is related to the minimum distance and the successive minimum of a lattice and it will be used to derive the approximation factors in the worst-case to average-case reduction for to the Twisted Ring-LWE problem. The Gaussian mass of a coset is defined as .
Definition 3
(Smoothing parameter). For an n-dimensional lattice Λ and positive real , the smoothing parameter is the smallest r such that .
For any , real , and an arbitrary lattice with dimension n, normalizing the Gaussian function gives the discrete Gaussian distribution over as
for all .
2.3. Algebraic Number Theory
In this section, we summarize concepts and results from algebraic number theory, presenting as an example the case of cyclotomic number fields and their maximal real subfields. Details can be found in [39,40].
An (algebraic) number field K is a finite extension of the field . This means that and K is a -vector space with finite dimension. The degree of K, denoted , is the dimension of the -vector space K. In general, if K and L are number fields such that , the symbol is defined to be the integer number and is called the degree of the extension .
By the Primitive Element Theorem, there exists an element such that , which is equivalent to say that , with , is a power basis of K over . Also, if is the minimal polynomial of over , then K is isomorphic to and for some root of . The roots of are called the conjugates of .
Example 1
(Cyclotomic number field). A number field of particular interest is , the m-th cyclotomic field, where is a primitive m-th root of unity for any integer number . The degree of is , where denotes Euler’s totient function. The minimal polynomial of , called the m-th cyclotomic polynomial, is , where denotes the group of invertible elements in .
Example 2
(Maximal real subfield). For , , the number field is the maximal real subfield of and has degree .
Let K be a number field. A map is called an involution of K if , , and , for all . If , the complex conjugation is an example of involution. If is a cyclotomic number field, then is the same involution given by the complex conjugation. In this work, whenever the cyclotomic number field is used, we implicitly assume this involution. For the maximal real subfield , we consider the involution given by the identity map.
The subfield , called the fixed field by involution of K, satisfies . When (or ), we say that the involution is trivial (it is the identity); otherwise, the involution is said to be non-trivial. If , the fixed field by the involution of K is its maximal real subfield [36].
2.3.1. Field Monomorphisms
Let K be a number field of degree n. There are exactly n distinct monomorphisms (of fields) from K to . These monomorphisms are -monomorphisms. If and is the minimal polynomial of , these monomorphisms can be defined as for , where are all the distinct roots of .
A monomorphism is said to be real if . Otherwise, it is said to be complex. If is a complex monomorphism, then is another complex monomorphism defined by . So, we can write the degree n as , where is the number of real monomorphisms and is the number of complex monomorphisms from K to . The canonical embedding from K into the subspace H is the homomorphism
Its image is a lattice, used in the Ring-LWE problem [4,9].
The pair is called the signature of K. We say that K is totally real when , and that K is totally complex when . The number field K is said to be a CM-field if it is totally complex and has degree two over its fixed field by the involution F [36].
Any cyclotomic number field , with , is totally complex. Their monomorphisms are defined as for each such that . In turn, any maximal real cyclotomic subfield is totally real. Their monomorphisms are defined as for each such that . Note that is a CM-field once is a totally complex field of degree two over .
The number field K is said to be a Galois number field if, for every , the minimal polynomial of x over has all its roots in K. In this case, the set of automorphisms , where for all , constitutes a group under the composition, called Galois group of K over and denoted by . If is a Galois number field, then the monomorphisms from K to are exactly the elements of . An important fact is that any Galois number field is totally real or totally complex. Cyclotomic number fields and their maximal real subfields are Galois number fields. Specifically, the set is isomorphic to and is isomorphic to .
2.3.2. Ring of Integers and Its Ideals
Let K be a Galois number field. For every , the trace and norm of any element can be defined, respectively, as
For all , and are elements of .
The set of all elements in a number field K that are the root of a monic polynomial in is a ring called the ring of integers of K, denoted by . If K is a number field of degree n, its ring of integers has a -basis with n elements, which is called an integral basis of K. If , then and are elements of .
If is a nonzero (integral) ideal of , then has a -basis with n elements. The same holds if is a fractional ideal of K, which is a subset of K satisfying the condition that is an integral ideal for some element . Note that every integral ideal is also fractional (). Also, any -basis of some nonzero fractional ideal of K, including its ring of integers, is a -basis of K. If is the m-th cyclotomic number field, then , which is the set of all -linear combinations of powers of . Similarly, the ring of integers of is . In general, the ring of integers of a number field does not have the form . When this is the case, we say that K is a monogenic number field.
The fractional ideal is the codifferent ideal, that is, the dual ideal of the ring of integers. Frequently, the codifferent ideal is also denoted by . Note that . If for some , then , where is the derivative of the minimal polynomial of [41] (Section 13.2, J). The inverse ideal of the codifferent, that is, , is an ideal of called different of K. In general, the dual ideal of any fractional ideal of K is the fractional ideal of K, defined as
If is a nonzero fractional ideal of , the norm of is (the cardinality of the quotient of additive groups). If and are ideals of , then , where denotes the product of , that is, the set all finite sums of products ab for and . If is a principal ideal generated by some , then .
2.4. The Ring-LWE Problem
In the following definitions, a lattice is usually represented by a basis and, in the context of algebraic lattices, can be seen as a fractional ideal of an arbitrary number field K via canonical embedding.
Firstly, we define the computational problems which form the foundation of the (Ring)-LWE hardness, namely the decision version of the Shortest Vector Problem (GapSVP), the Shortest Independent Vectors Problem (SIVP), and the Discrete Gaussian Sampling (DGS) problem, which is denoted K-DGS when the underlying lattice is taken over a number field K [4].
Definition 4
(GapSVP). For an approximation factor , the GapSVP is: given a lattice Λ and length , output YES if and NO if .
Definition 5
(SIVP). For an approximation factor , the SIVP is: given a lattice Λ, output n linearly independent lattice vectors of length at most .
By seeing a fractional ideal of an arbitrary number field K as a lattice using the canonical embedding, let denote the discrete Gaussian distribution of width r over in the field tensor product , which is isomorphic to the space H.
Definition 6
(K-DGS). For a function γ that maps lattices to nonnegative reals, the K-DGS problem is: given an ideal in K and a parameter , output an independent sample from a distribution that is within negligible distance of .
Alternatively, for the purpose of the worst-case to average-case reduction for (Ring-)LWE, the DGS problem can be stated as follows: given an n-dimensional lattice and a number , output a sample from .
In order to define the Ring-LWE distribution and the computational problems associated with it, let K be a number field with ring of integers . Recall that is the (fractional) codifferent ideal of K, and let . Let be a (rational) integer modulus and, for any fractional ideal of K, let .
Definition 7
([4] Ring-LWE distribution). For (the “secret”) and an error distribution ψ over , a sample from the Ring-LWE distribution over is generated by choosing uniformly at random, choosing , and outputting .
Definition 8
([4] Ring-LWE, search). Let Ψ be a family of distributions over . The search version of the Ring-LWE problem, denoted R-LWE, is defined as follows: given access to arbitrarily many independent samples from , for some arbitrary and , find s.
Definition 9
([4,9] Ring-LWE, average-case decision). Let Υ be a distribution over a family of error distributions, each over . The average-case Ring-LWE decision problem, denoted R-LWE, is to distinguish (with non-negligible advantage) between independent samples from for a random choice of , and the same number of uniformly random and independent samples from .
3. The Twisted Ring-LWE
Firstly, we collect important results on algebraic lattices obtained through twisted embeddings. Then, we present the class of problems Twisted Ring-LWE, which is the main contribution of this work. The hardness of Twisted Ring-LWE is demonstrated by security reductions from the original Ring-LWE problem. Also, we recompute the approximation factors in the worst-case to average reduction from the SIVP problem, considering the twist factor defining the twisted embedding.
3.1. Twisted Embeddings
In this section consider the following setting. Let K be an algebraic number field with degree n, signature , and a fixed involution. Consider F to be the fixed field by the involution of K. Let be the real monomorphisms for , and be the complex monomorphisms for from K to , where for all . The twisted embeddings defined next are a generalization of the canonical embedding [36]. An element is said to be totally positive if and is a positive real number for all .
Definition 10
(Twisted embeddings). For any totally positive , the τ-twisted embedding (or simply twisted embedding) is the homomorphism , defined as
Since in F is totally positive, then , which means that twisted embeddings are generalizations of the canonical embedding. Twisted embeddings provide a way to obtain a variety of lattices in in addition to the ones obtained via canonical embedding, as a consequence of Proposition 1 [36].
Proposition 1
([36]). If M is a free -module of rank n in K (particularly, if M is the ring of integers of K or any fractional ideal of K), then is a full-rank lattice in H.
Twisted embeddings can be extended from K to as follows. For any totally positive element , the -vector space is isomorphic to . If is a -basis of the number field K, then is an -basis of . So, for all totally positive , is an -basis of H.
Consider the natural extension of the trace function to . For any totally positive , we can define an inner product in as
(2) |
By considering the inner product , the -vector space is an Euclidean vector space of dimension n isometric to both and .
For each , the -norms of a under the canonical embedding are simply for , and for . Similarly, the -norms induced from under twisted embeddings are defined as
for , and the -norm is
where for a totally positive element . Thus, any free -module M of rank n can be seen as a full-rank lattice directly in the Euclidean vector space (,), although the image of is frequently considered as in .
Using the fact that for any , where ⊙ is the component-wise multiplication in the space H, it follows that
(3) |
Notice that, since multiplication of elements in is mapped to coordinate-wise multiplication in H, we have that for any element , the distribution of is , where for . Because of the induced norms from , which maps elements of K to H, an elliptical distribution defined in the space H can be seen as a distribution directly over . For practical applications, sampling from an error distribution in is done by generating the error in H and mapping it to its corresponding element in , via twisted embeddings. However, in some special cases, an error can be efficiently sampled directly in without requiring the computation of the inverse of the Vandermonde matrix with respect to [11].
Since under twisted embeddings, it follows that admits an orthonormal basis. Thus, for any -basis of the free -module M of rank n in K, the matrix is a Gram matrix of the lattice M in (,), which coincides with the Gram matrix of in with respect to the basis . It should be clear that, for different totally positive elements, the lattices obtained from M may not be equivalent, as can be seen below.
Example 3.
Let be a totally real number field with degree two. It follows that the fixed field by the usual involution is . For any totally positive element , consider the lattice in the inner product space . The set is a -basis of and the Gram matrix of the lattice is given by
(4) For example, for and , the Gram matrices are given by:
(5) Suppose that these two lattices are equivalent. Then, there exists a square matrix with integer entries and determinant , and a real number such that . Since the determinant of both matrices in (5) is equal to 12, then . Now, consider to be a matrix for which the rows are given by the vectors and . So, the system of equations has no solution because the equation , provided by the first entry, has no solution . This gives a contradiction. Therefore, the lattices given by the same module in the two different inner product spaces and are not equivalent.
Any full-rank lattice M in is said to be an algebraic lattice. If is a fractional ideal in K and the lattice is integral (that is, for all ), then can be called an ideal lattice in . Since , an ideal of K constitutes an ideal lattice in if and only if (). Ideal lattices can be obtained if and only if K is either a totally real number field or a CM-field. In particular, ideal lattices can be obtained via cyclotomic number fields and their maximal real subfields.
Let be a fractional ideal of K. It is known that in H under the canonical embedding. However, the same does not hold for twisted embeddings in general, as can be inferred from Proposition 2.
Proposition 2.
Let be a totally positive element and let a fractional ideal of K. Then, in the Euclidean vector space , it follows that:
- (i)
; and
- (ii)
is an unimodular (self-dual) lattice in if and only if .
Proof.
By definition, if and only if , which occurs if and only if , which is equivalent to . This proves . Secondly, is unimodular when is integral and . The lattice is integral if and only if . In turn, by , if and only if , which is equivalent to . Therefore, is unimodular if and only if . □
3.2. The Twisted Ring-LWE Problem
In this section, we propose an extended version of the Ring-LWE problem, adopting twisted embeddings rather than the canonical embedding. We refer to this new class of problems as Twisted Ring-LWE, or simply Ring-LWE. We also prove that solving the Twisted Ring-LWE problem is at least as hard as solving the original Ring-LWE problem [4], providing a polynomial-time reduction from Ring-LWE to Twisted Ring-LWE.
In the Ring-LWE distribution, the error e is randomized by a distribution over the space . In this sense, an error in can be seen as the inverse image of a sample from the distribution in via the canonical embedding. In our general case, we consider K a number field with an involution, F its associated fixed field, a totally positive element, and the twisted embedding. The error e is randomized by a distribution over . In the following, it is assumed is an integer number, , and for any fractional ideal of K.
Definition 11
(Twisted Ring-LWE distribution). For a totally positive element , let denote an error distribution over the inner product and (the “secret”) be an uniformly randomized element. The Twisted Ring-LWE distribution produces samples of the form
(6) where a is uniformly randomized in and the error e is randomized by in .
Analogously to Ring-LWE [4], which is defined in the space provided with the inner product associated to the canonical embedding, we can define both search and decision problems in the space as follows. We strictly follow the search problem as defined by Lyubashevsky et al. [4] and the decision problem which was further defined by Peikert et al. [9].
Definition 12.
For a positive real , the family is the set of all elliptical Gaussian distributions over , where each parameter .
Definition 13
(Ring-LWE, search). Let be a family of distributions over the inner product space (,). The search version of the Ring-LWE problem is defined as follows: given access to arbitrarily many independent samples from for some arbitrary and , find s.
Definition 14.
Fix an arbitrary . For , a distribution sampled from is an elliptical Gaussian in , where is sampled as follows: for , sample and set . For , sample and set .
Notice that, in Definition 14, sampling for and for is done according to the Gaussian function given in Equation (1), using the norm induced by the corresponding twisted embedding.
Definition 15
(Ring-LWE, average-case decision). Let be a distribution over a family of error distributions, each in the inner product space (,). The average-case decision version of the Ring-LWE problem is to distinguish, with non-negligible advantage, between arbitrarily many independent samples from , for a random choice of , and the same number of uniformly random and independent samples from .
Generally speaking, the Twisted Ring-LWE distribution and both search and decision variants of Twisted Ring-LWE collapse to their original definitions in the Ring-LWE problem when .
3.3. Hardness of Twisted Ring-LWE
In this section we provide evidence of the hardness of the Ring-LWE class of problems. Firstly, we provide reductions from the Ring-LWE problem to the Ring-LWE problem. By doing so, the Ring-LWE problem is proven to be at least as hard as NP-hard lattice problems. It occurs that these are indeed self reductions, in the sense that they preserve the secret term , only distorting the error distribution over .
We recall that the reduction to the search version of Ring-LWE is defined over a set of elliptical Gaussian distributions over (Definition 12).
Theorem 1.
Let K be an arbitrary number field and be totally positive. Let be randomly chosen from in . Then there is a polynomial-time reduction from Ring-LWE to Ring-LWE.
Proof.
We assume the existence of an oracle for Ring-LWE that, given a set of independent samples from , for some arbitrary and , recovers the secret term s. Given a set of independent samples from the Ring-LWE distribution , solving the search version of Ring-LWE amounts to finding the secret s. In order to evoke the Ring-LWE oracle to solve Ring-LWE, we must ensure that the error terms from the input samples follow a Gaussian distribution . Let the input samples from be represented as
where . Thus, we use the fact that , for some obtained from the Gaussian distribution over H. The Ring-LWE samples are obtained by first computing the corresponding representatives of each pair in H as
By applying the inverse transformation , we obtain that
(7) Notice that s was unchanged by the transformations, so it is a randomized element over . Because was sampled according to a uniform distribution over and both and transformations are injective, is also uniform in . And, finally, since is randomized by in , the set of samples in (7) follows the distribution . Given the set of samples (7) as input for the Ring-LWE solver, it finds the secret s. Then, mapping the solution to the Ring-LWE instance of the Ring-LWE solution is done by the identity transformation. Since the computation of the transformations and can be seen as vector-matrix multiplications, the reduction costs operations. Thus, the given reduction from Ring-LWE to Ring-LWE runs in polynomial time. This concludes the proof. □
Theorem 2.
Let K be an arbitrary number field and be a totally positive element. Let be randomly chosen from in . There is a polynomial-time reduction from Ring-LWE to Ring-LWE.
Proof.
Given a set of m pairs of the form , each drawn either from or from a uniform distribution over , we prove that the (decision) Ring-LWE problem can be solved using only an oracle for (decision) Ring-LWE and a polynomial-time function for mapping the input instances. As in the reduction for the search variant, we apply the transformations and , in this order, to each pair . As a result, those pairs drawn from are still uniformly distributed over , since both and are injective maps. On the other hand, the pairs drawn from now follow the Ring-LWE distribution . Thus, given an algorithm that solves (decision) Ring-LWE, it distinguishes in two different sets the samples drawn from and those uniformly distributed. Since mapping Ring-LWE to Ring-LWE instances preserves distributions, the solution for (decision) Ring-LWE problem is done by an identity transformation. Finally, the computation of the transformations and costs operations; thus, the reduction runs in polynomial time. This concludes the proof. □
3.4. Computing the Approximation Factors
Throughout this section, consider an arbitrary number field K of degree n with ring of integers , and a fractional ideal in K. Concerning the canonical embedding, a twisted embedding modifies the representatives of a fractional ideal when seen as a lattice in H. Thus, since we use lattice measures such as the minimum distance and the successive minima in the security reductions, we analyze the effect of redefining the inner product in the Ring-LWE security reductions.
By strictly following the setting of Lyubashevsky et al. [4], we start by deriving upper bounds for the smoothing parameter concerning the -norm under twisted embeddings. From the inequalities in (3), we are able to relate the -norm under twisted embeddings with the infinity norm under the canonical embedding as
We can also relate -norms under both embeddings in H as
Using the above inequalities, Lemmas 1 and 2 present upper bounds for the smoothing parameter associated with twisted embeddings, which are a straightforward adaptation of Lemmas 2.7 and 3.5 from [42]. Notice that, when , these upper bounds are exactly the same as presented in [42]. Consider that and denotes the k-th successive minimum and the minimum distance of a lattice in the -norm, respectively, under a -twisted embedding.
Lemma 1.
Let K be an arbitrary number field with fixed field by the involution F and totally positive. For any , any n-dimensional lattice Λ in , and any ,
In particular, for any function, there is a negligible function for which
Lemma 2.
Let K be an arbitrary number field with fixed field by the involution F and totally positive. For any , any n-dimensional lattice Λ in , and any ,
In particular, for any function, there is a negligible function such that
The (search) Ring-LWE hardness consists in two reductions: a worst-case to average-case reduction from DGS to Ring-LWE (Theorem 3); and a reduction from the Generalized Independent Vectors Problem (GIVP), which is a generalization of SIVP, to DGS (Lemma 3).
Theorem 3
([4] (Theorem 4.1)). Let K be an arbitrary number field of degree n with ring of integers , and a fractional ideal in K. Let , and let be such that . For some negligible , there is a probabilistic polynomial-time quantum reduction from K-DGS to R-LWE, where
Lemma 3
([3] (Lemma 3.17)). For any and any , there is a polynomial time reduction from GIVP to DGS.
Thus, we use the inequalities for the smoothing parameter derived in Lemmas 1 and 2 to recompute the approximation factors in Theorem 3 and Lemma 3. We start by computing the approximated factor from Theorem 3. As long as , it follows that the K-DGS parameter is
Using the inequality from Lemma 1, we obtain that the parameter in Lemma 3 is
Now, using the above inequality for , we define the upper bound for the GIVP parameter to be , for which
Remark 1.
Notice that, regardless of the -norm, . Since is the approximation factor for the search version of the Ring-LWE problem [4] (Section 4), we conclude that the approximation factors remain unchanged with respect to the change of embeddings due to the asymptotic notation. Moreover, since the twisting factor is constant concerning the number field degree n, the approximation factors for the decision version of the Twisted Ring-LWE problem also remain unchanged.
4. Applications of the Twisted Ring-LWE
In this section, we discuss how to extend to a more general class of number fields the results of Ducas and Durmus for sampling from a spherical Gaussian distribution [11], focusing on the algebraic realization of -lattices.
Durmus and Ducas proved a special case when a spherical Gaussian distribution with width s in the power basis corresponds to a spherical Gaussian distribution with width over the space H (Theorem 4) [11]. In order to sample directly over the cyclotomic ring , leading to the correct distribution in the embedding representation, they sample the error polynomial in the ring , where if m is odd, and if m is even. Then, the reduction modulo leads to the correct distribution under the canonical embedding. This method avoids resorting to complex embeddings and the inverse of the Vandermonde matrix.
In the statement of Theorem 4, let if m is odd and if m is even. Also, let represent the polynomial reduction from to , and let the linear operator with matrix in the canonical basis of H be:
(8) |
Theorem 4
([11] (Theorem 5)). Let be a random variable distributed as in the power basis. Then, the distribution of , seen in the canonical basis of H, is the spherical Gaussian .
The shape of the distribution is preserved because the transformation is, in fact, a scaled-orthogonal map from the power basis of to the space H, where is Hermitian (). The proof for Theorem 4 reduces to proving that , the matrix representing the linear map from the power basis of to the canonical basis of satisfies . The coefficients of are given by . Then, for all , we have that
Thus, , so . This last equation implies that, if a random variable has covariance matrix , then the covariance matrix of is , and the distribution of is the spherical Gaussian .
In the following, we discuss how the shape of spherical Gaussian distributions may be preserved when seen in the space H for special algebraic constructions under twisted embeddings. Following Ducas and Durmus’ approach, we are interested in lattices equivalent to , whose Gram matrices have the form for . In this sense, the matrix mapping elements of to the space H is a scaled-orthogonal map [11]. It follows that any algebraic realization of the -lattice preserves the shape of an error distribution over when seen as in H.
In Theorem 5, we prove that fractional ideals realizing lattices equivalent to in an orthonormal basis, which are the special case when the Gram matrix is simply , preserve both format and standard deviation of spherical Gaussian distributions. We recall that ideal lattices can be obtained if and only if K is a totally real number field, or if K is a CM-field [36].
Theorem 5.
Let K be a number field with an involution and F its associated fixed field. Consider totally positive and a fractional ideal such that is an ideal lattice in . If is a lattice equivalent to , then both the shape and the standard deviation of a spherical Gaussian distribution in an orthonormal basis of are preserved when seen in the canonical basis of the space H (via the twisted embedding ).
Proof.
Let n be the degree of K and let be a random variable over the spherical Gaussian distribution with covariance matrix in an orthonormal -basis of , for some real number s. Since the twisted embedding is a linear transformation, the covariance matrix of in the canonical basis of H is , where , with as in (8) and is the generator matrix of . Since , and because is the Gram matrix of the -equivalent lattice in , the covariance matrix of is
which proves that is randomized in the spherical Gaussian distribution over the canonical basis of H with the same standard deviation as v over in the orthonormal basis of . This concludes the proof. □
Examples of ideal lattices equivalent to are those obtained from cyclotomic number fields [36], and their maximal real subfields [37], and the maximal real subfields for any prime [43]. The case of the power-of-two cyclotomic number fields were previously addressed by Lyubashevsky et al. [4], and Ducas and Durmus [11]. In the following, we discuss the family of lattices equivalent to built on , for any prime.
Let be a prime number, , and . The cyclotomic construction of the -lattice (Proposition 3) is on the ring of integers of the maximal real subfield of a cyclotomic number field, denoted , whose integral basis is .
Proposition 3
([44] (Proposition 1)). Let be a prime number, and let and . Then in is a lattice equivalent to with basis , where is an integral basis of K.
The generator matrix of the -lattice in (this is an equality because K is totally real), realized in Proposition 3, is given by
(9) |
where , and
As an immediate consequence of Theorem 5, in Corollary 1 we prove that the construction for the -lattice mentioned above, in fact does not change the shape of the error distribution and, more importantly, the standard deviation is the same when the distribution is seen over H.
Corollary 1.
Let for prime and let be a random variable distributed as in the basis . Then, the distribution of for , seen in the canonical basis of H, is the spherical Gaussian .
Proof.
In the realization of the -lattice (Proposition 3), the matrix representing the linear map from the basis of to the canonical basis of is given by (9). Since is a lattice equivalent to in the basis , the result follows immediately from Theorem 5. This concludes the proof. □
4.1. Practical Impacts on a Public-Key Cryptosystem
In this section, we use the fact that is a subfield of , for p prime, to analyze the practical impacts of instantiating the Ring-LWE problem over the ring of integers of K in the compact public-key cryptosystem of Lyubashevsky, Peikert, and Regev [12] (Section 8.2).
The public-key cryptosystem presented below is parameterized by an m-th cyclotomic ring R and two coprime integers and q. The message space is defined as and it is required that q be coprime with every odd prime dividing m. Consider that is an error distribution over and denotes a valid discretization to (cosets) of or . Also, if m is even, otherwise . Finally, for any , let denote the unique representative , which is entry-wise extended to polynomials.
Gen: choose a uniformly random . Choose and . Output as the public key, and x as the secret key.
Enc: choose , and . Let and . Output .
Dec: compute , and decode it to . Output .
In such an encryption scheme, the most computationally expensive operations are given by the error sampling and the discretization of the error terms, and the polynomial multiplication. As proved in Corollary 1, when R is the ring of integers of , the sampling of error terms can be performed directly over in the orthonormal basis while preserving the spherical format and the standard deviation with respect to the corresponding distribution in H. In this case, the error sampling is similar to that performed when K is a cyclotomic field with dimension a power of two, where the spherical format is preserved but the standard deviation increases by . Because of that, any algorithm for one-dimensional discrete Gaussian sampling can be used in our instantiation, including those already adopted in the power-of-two cyclotomic case. The efficiency of discrete sampling when is emphasized by the fact that the discretization in -lattices is simply a coordinate-wise rounding to the nearest integer.
In Ring-LWE cryptosystems, arithmetic operations such as addition and multiplication are performed in the polynomial representation of the ring of integers. The ring of integers of the maximal real subfield is . Thus, associating with indeterminate x yields an isomorphism between and , where is the minimal polynomial of . This would require a change of basis from , the basis used for error sampling, to the power basis . The coefficients of the defining polynomial vary according to the choice of p. Aranés and Arenas provided a closed formula for the coefficients of for p prime and (Theorem 7). Consider that, for strictly positives r and k, are the determinants of order k, defined in Theorem 6. For details, we refer the reader to [45].
Theorem 6
([45] (Theorem 1)). For any strictly positive integers r and k, we have that
where denotes the binomial coefficient .
Theorem 7
([45] (Theorem 2)). The coefficients of the polynomial are given by the following formulae. If p is odd,
and in the case , :
Notice that, in our case, ; thus, all coefficients are always non-zero. For example, when , we have that and the defining polynomial is
which is very dense and the coefficients are not restricted to the set . However, depending on the choice of value for the coefficient’s modulus q, the defining polynomial may have a complete factorization modulo q, which allows algorithms based on the Chinese Remainder Theorem (CRT) for efficient polynomial multiplication. For example, for and , the defining polynomial factors in 15 distinct degree-one polynomials as follows:
(10) |
Thus, can be factored as , where are polynomials of small degree. The multiplication modulo is done by computing and , for , computing the component-wise multiplication and, finally, using the inverse operation to obtain the polynomial c such that , as discussed by Lyubashevsky and Seiler [27]. Although the asymptotic cost of an algorithm based on this technique is , the hidden constants may be large due to the increased number of reductions modulo q in comparison with CRT-based algorithms for power-of-two cyclotomic number fields [27,46]. Another important aspect of the defining polynomial is captured by the expansion factor, a property introduced by Lyubashevsky and Micciancio [47]. The expansion factor of a polynomial f is
where is the norm of the polynomial g after reduction modulo f. By computing the expansion factor of , we can measure the increase in magnitude of the maximum coefficient of . Also, the expansion factor helps us in choosing a value for q such that the coefficients do not wrap around after arithmetic operations, avoiding the occurrence of decryption errors.
In order to analyze the expansion factor of , we compare it with , the defining polynomial of cyclotomic polynomial rings with dimension a power of two, which is widely adopted in practical applications. For that, we recall Lemma 4, which defines an upper bound for the magnitude of the coefficients of a polynomial after a reduction modulo f.
Lemma 4.
If g is a polynomial in and f is a monic polynomial in such that , then .
For the case , it is sufficient to analyze the value of . Firstly, for , we have that . On the other hand, when , assumes the maximum value of according to Theorem 7. For example, for , , leading to an exponential growth of coefficients, which is roughly times bigger with respect to the case when . Such growth of coefficients require an increased value for the choice of the modulus q in order to avoid the coefficients to wrap around after polynomial operations. This also leads to an increase in the length of system parameters and memory/bandwidth requirement for transmission of public parameters.
In the positive direction, since the dimension of K does not increase as a power-of-two, one may want to find a ring instantiation that closely achieves a target security level. For example, to obtain a ring dimension between 700 and 800, the required for achieving 128-bit security [27], possible choices for the value of p ranges from the 223-th to the 252-th prime number, comprehending 29 possible choices.
In a nutshell, we have discussed some practical impacts of instantiating the Twisted Ring-LWE problem when K is the maximal real subfield of a cyclotomic number field, whose dimension is for any prime . The increased cost in arithmetic operations is inherent to this particular instantiation and field representation, but the same cannot be said about all algebraic constructions which lead to lattices equivalent to . This is reinforced by the fact that the ring of integers of power-of-two cyclotomic number fields also leads to lattices equivalent to and, yet, it allows for very efficient algorithms for arithmetic operations in the power basis representation. Thus, in Section 5, we briefly discuss on an alternative field representation when K is the maximal real subfield of a cyclotomic number field. Moreover, we present future research possibilities related to the Twisted Ring-LWE problem.
5. Discussion
In this paper, we introduce an extension to the Ring-LWE class of problems, namely The Twisted Ring-LWE Problem [4,9]. The Ring-LWE problem uses the canonical embedding to map some underlying ring to a lattice in . By doing so, we can define geometric norms and error distributions on the tensor field , which is isomorphic to . The Twisted Ring-LWE problem is obtained by adopting twisted embeddings [36] rather than the canonical embedding, which is a specialization of twisted embeddings. We prove that the Twisted Ring-LWE Problem is as secure as the original Ring-LWE Problem by providing a security reduction from both variants of Ring-LWE to their twisted forms.
As a result, we broaden the scope of number of algebraic lattices that can be used for lattice-based cryptosystems, including those algebraic constructions of lattices that allow additional factors on the embedding coordinates. This type of construction has been useful in coding theory, since they allow the construction of algebraic lattices with improved properties for Rayleigh fading channels, providing high density, maximum diversity, and great minimum product distance [33,34,35]. Notice that these constructions cannot be obtained via canonical embedding. We took as an example the construction of rotated -lattices. We prove that we can perform efficient and secure sampling from spherical Gaussian distributions in , if the parameter ring leads to a rotated -lattice in the space H via twisted embeddings. This generalizes the results of Ducas and Durmus in Theorem 5 [11] and the power-of-two cyclotomic case.
An example of a construction of the -lattice via twisted embeddings is from maximal real subfields of both power-of-two and p-th cyclotomic number fields. We analyze instantiating the Ring-LWE problem using maximal real subfields of p-th cyclotomic number fields in a public-key encryption scheme [12]. By doing so, we can instantiate the Ring-LWE problem in a dimension close to 700 to achieve 128-bit security [25] and provide variability of security assumptions, avoiding the use of the widely adopted power-of-two cyclotomic number field. However, representing the field elements as residue polynomials modulo the defining polynomial is of limited interest, since the coefficients’ modulus may become very large to avoid the occurrence of decryption errors. This occurs because the expansion factor of the defining polynomial of maximal real subfields of p-th cyclotomic number fields grows exponentially.
Future Work
Lyubashevsky, Peikert, and Regev [12] suggested representing the field elements as coefficient vectors in an integral basis apart from the power basis. By taking the underlying ring as the ring of integers of the maximal real subfield of a cyclotomic number field on an orthonormal basis, we can perform efficient Gaussian sampling with hardness guarantee, as discussed in Section 4. Moreover, we can perform efficient ring arithmetic by taking the ring representatives under the twisted embedding, in which both addition and multiplication are taken component-wise. Although the change of representation may need floating-point arithmetic, one may explore lattice basis symmetries to accelerate the computation of the twisted embedding or find a basis more suitable for arithmetic operations. In addition to that, all algorithmic tasks can be performed directly in the space H, without resorting to change of representation from . We leave as future work a full analysis and the software implementation of the instantiation of the Twisted Ring-LWE Problem in a cryptosystem adopting the coefficient vector representation.
We also leave as future work detailing how to connect Twisted Ring-LWE instantiations over different number fields, if the ring of integers of both number fields leads to equivalent lattices under twisted embeddings. By doing so, we can connect an instance on a power-of-two cyclotomic number field to an instance of a maximal real subfield as both rings of integers lead to a construction of the -lattice. This may lead to a response to the open question left by Peikert, Regev, and Stephens-Davidowitz [9]. As a consequence, we may be able to explore algebraic properties inherent to maximal real subfields helping to assert the concrete hardness of power-of-two cyclotomic number fields.
Author Contributions
All authors contributed to the study conception and design. The first draft of the manuscript was written by J.N.O. and R.R.d.A. and all authors contributed to all versions of the manuscript. All authors have read and agreed to the published version of the manuscript.
Funding
The authors were supported in part by the Brazilian Coordination for the Improvement of Higher Education Personnel Foundation (CAPES) grant numbers 1591123 and 1540410, the Brazilian National Council for Scientific and Technological Development (CNPq) grant numbers 164489/2018-5 and 313326/2017-7, and the São Paulo Research Foundation (FAPESP) grant number 2013/25977-7. The authors acknowledge the support from the DIGIT Centre for Digitalisation, Big Data and Data Analytics; and the Concordium Blockchain Research Center at Aarhus University.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Ajtai M. Generating Hard Instances of Lattice Problems (Extended Abstract); Proceedings of the STOC ’96, Twenty-Eighth Annual ACM Symposium on Theory of Computing; Philadelphia, PA, USA. 22–24 May 1996; New York, NY, USA: ACM; 1996. pp. 99–108. [DOI] [Google Scholar]
- 2.Peikert C. A Decade of Lattice Cryptography. Found. Trends Theor. Comput. Sci. 2016;10:283–424. doi: 10.1561/0400000074. [DOI] [Google Scholar]
- 3.Regev O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography; Proceedings of the STOC ’05, Thirty-Seventh Annual ACM Symposium on Theory of Computing; Baltimore, MD, USA. 22–24 May 2005; New York, NY, USA: ACM; 2005. pp. 84–93. [DOI] [Google Scholar]
- 4.Lyubashevsky V., Peikert C., Regev O. Advances in Cryptology—Proceedings of the EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 30 May–3 June 2010. Springer; Berlin/Heidelberg, Germany: 2010. On Ideal Lattices and Learning with Errors over Rings; pp. 1–23. [DOI] [Google Scholar]
- 5.Brakerski Z., Gentry C., Vaikuntanathan V. (Leveled) Fully Homomorphic Encryption without Bootstrapping; Proceedings of the ITCS ’12, 3rd Innovations in Theoretical Computer Science Conference; Cambridge, MA, USA. 8–10 January 2012; New York, NY, USA: Association for Computing Machinery; 2012. pp. 309–325. [DOI] [Google Scholar]
- 6.Langlois A., Stehlé D. Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 2015;75:565–599. doi: 10.1007/s10623-014-9938-4. [DOI] [Google Scholar]
- 7.Albrecht M.R., Deo A. Large Modulus Ring-LWE ≥ Module-LWE. In: Takagi T., Peyrin T., editors. Advances in Cryptology—ASIACRYPT 2017—23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017. Volume 10624. Springer; Cham, Switzerland: 2017. pp. 267–296. Proceedings Part I Lecture Notes in Computer Science. [DOI] [Google Scholar]
- 8.Peikert C., Pepin Z. Algebraically Structured LWE, Revisited. In: Hofheinz D., Rosen A., editors. Theory of Cryptography. Springer International Publishing; Cham, Switzerland: 2019. pp. 1–23. [Google Scholar]
- 9.Peikert C., Regev O., Stephens-Davidowitz N. Pseudorandomness of ring-LWE for Any Ring and Modulus; Proceedings of the STOC 2017, 49th Annual ACM SIGACT Symposium on Theory of Computing; Montreal, QC, Canada. 19–23 June 2017; New York, NY, USA: ACM; 2017. pp. 461–473. [DOI] [Google Scholar]
- 10.National Institute of Standards and Technology Post-Quantum Cryptography. [(accessed on 30 July 2021)];2017 Available online: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization.
- 11.Ducas L., Durmus A. Public Key Cryptography, Proceedings of the PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 21–23 May 2012. Springer; Berlin/Heidelberg, Germany: 2012. Ring-LWE in Polynomial Rings; pp. 34–51. [DOI] [Google Scholar]
- 12.Lyubashevsky V., Peikert C., Regev O. A Toolkit for Ring-LWE Cryptography. Cryptology ePrint Archive, Report 2013/293. 2013. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2013/293.
- 13.Campbell P., Groves M., Shepherd D. SOLILOQUY: A Cautionary Tale. ETSI 2nd Quantum-Safe Crypto Workshop. 2014. [(accessed on 30 July 2021)]. pp. 1–9. Available online: http://docbox.etsi.org/Workshop/2014/201410_CRYPTO/S07_Systems_and_Attacks/S07_Groves_Annex.pdf.
- 14.Smart N.P., Vercauteren F. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. In: Nguyen P.Q., Pointcheval D., editors. Public Key Cryptography, Proceedings of the PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, 26–28 May 2010. Springer; Berlin/Heidelberg, Germany: 2010. pp. 420–443. [DOI] [Google Scholar]
- 15.Eisenträger K., Hallgren S., Lauter K. Weak Instances of PLWE. In: Joux A., Youssef A., editors. Selected Areas in Cryptography, Proceedings of the SAC 2014: 21st International Conference, Montreal, QC, Canada, 14–15 August 2014. Springer International Publishing; Cham, Switzerland: 2014. pp. 183–194. Revised Selected Papers. [Google Scholar]
- 16.Elias Y., Lauter K.E., Ozman E., Stange K.E. Provably Weak Instances of Ring-LWE. In: Gennaro R., Robshaw M., editors. Advances in Cryptology, Proceedings of the CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015. Springer; Berlin/Heidelberg, Germany: 2015. pp. 63–92. Proceedings, Part I. [DOI] [Google Scholar]
- 17.Chen H., Lauter K.E., Stange K.E. Attacks on the Search-RLWE Problem with Small Error. Cryptology ePrint Archive, Report 2015/971. 2015. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2015/971.
- 18.Castryck W., Iliashenko I., Vercauteren F. Provably Weak Instances of Ring-LWE Revisited; Proceedings of the 35th Annual International Conference on Advances in Cryptology—EUROCRYPT 2016; Vienna, Austria. 8–12 May 2016; New York, NY, USA: Springer; 2016. pp. 147–167. [DOI] [Google Scholar]
- 19.Castryck W., Iliashenko I., Vercauteren F. On error distributions in ring-based LWE. LMS J. Comput. Math. 2016;19:130–145. doi: 10.1112/S1461157016000280. [DOI] [Google Scholar]
- 20.Chen H., Lauter K., Stange K.E. Security Considerations for Galois Non-dual RLWE Families. In: Avanzi R., Heys H., editors. Selected Areas in Cryptography, Proceedings of the SAC 2016, Pisa, Italy, 4–8 April 2016. Springer International Publishing; Cham, Switzerland: 2017. pp. 443–462. [Google Scholar]
- 21.Chen H. Solving Ring-LWE over Algebraic Integer Rings. Cryptology ePrint Archive, Report 2019/791. 2019. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2019/791.
- 22.Chen H. Subset Attacks on Ring-LWE with Wide Error Distributions I. Cryptology ePrint Archive, Report 2020/440. 2020. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2020/440.
- 23.Chen H. Ring-LWE over Two-to-Power Cyclotomics Is Not Hard. Cryptology ePrint Archive, Report 2021/418. 2021. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2021/418.
- 24.Stange K.E. Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum-Kalai-Wasserman Algorithm. Cryptology ePrint Archive, Report 2019/183. 2019. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2019/183.
- 25.Albrecht M.R., Curtis B.R., Deo A., Davidson A., Player R., Postlethwaite E.W., Virdia F., Wunderer T. Estimate all the LWE, NTRU Schemes! Cryptology ePrint Archive, Report 2018/331. 2018. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2018/331.
- 26.Peikert C. How (Not) to Instantiate Ring-LWE. In: Zikas V., De Prisco R., editors. Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, 31 August–2 September 2016. Springer International Publishing; Cham, Switzerland: 2016. pp. 411–430. [DOI] [Google Scholar]
- 27.Lyubashevsky V., Seiler G. NTTRU: Truly Fast NTRU Using NTT. Cryptology ePrint Archive, Report 2019/040. 2019. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2019/040.
- 28.Chen C., Danba O., Hoffstein J., Hülsing A., Rijneveld J., Schanck J.M., Saito T., Schwabe P., Whyte W., Xagawa K., et al. NTRU Algorithm Specifications And Supporting Documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project. 2020. [(accessed on 30 July 2021)]. Available online: https://ntru.org/resources.shtml.
- 29.Bernstein D.J., Chuengsatiansup C., Lange T., van Vredendaal C. NTRU Prime: Reducing Attack Surface at Low Cost. Cryptology ePrint Archive, Report 2016/461. 2016. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2016/461.
- 30.Mayer C.M. Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields. Cryptology ePrint Archive, Report 2016/049. 2016. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2016/049.
- 31.Crockett E., Peikert C. Λoλ: Functional Lattice Cryptography. In: Weippl E.R., Katzenbeisser S., Kruegel C., Myers A.C., Halevi S., editors. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security; Vienna, Austria. 24–28 October 2016; New York, NY, USA: ACM; 2016. pp. 993–1005. [DOI] [Google Scholar]
- 32.Peikert C., Regev O., Stephens-Davidowitz N. Pseudorandomness of Ring-LWE for Any Ring and Modulus (Slides) 2017. [(accessed on 30 July 2021)]. Available online: https://web.eecs.umich.edu/~cpeikert/pubs/slides-anyring.pdf.
- 33.Boutros J., Viterbo E., Rastello C., Belfiore J.C. Good lattice constellations for both Rayleigh fading and Gaussian channels. IEEE Trans. Inf. Theory. 1996;42:502–518. doi: 10.1109/18.485720. [DOI] [Google Scholar]
- 34.Jorge G.C., Costa S.I. On rotated Dn-lattices constructed via totally real number fields. Arch. Der Math. 2013;100:323–332. doi: 10.1007/s00013-013-0501-8. [DOI] [Google Scholar]
- 35.De Araujo R.R., Jorge G.C. Constructions of full diversity Dn-lattices for all n. Rocky Mt. J. Math. 2020;50:1137–1150. doi: 10.1216/rmj.2020.50.1137. [DOI] [Google Scholar]
- 36.Bayer-Fluckiger E. Contemporary Mathematics. Volume 241 American Mathematical Society; Providence, RI, USA: 1999. Lattices and Number Fields. [Google Scholar]
- 37.Andrade A.A., Interlando J.C. Rotated ℤn-Lattices via Real Subfields of ℚ(ζ2r) TEMA (São Carlos) 2019;20:445–456. doi: 10.5540/tema.2019.020.03.445. [DOI] [Google Scholar]
- 38.Micciancio D., Regev O. Worst-Case to Average-Case Reductions Based on Gaussian Measures. SIAM J. Comput. 2007;37:267–302. doi: 10.1137/S0097539705447360. [DOI] [Google Scholar]
- 39.Samuel P., Silberger A.J. Algebraic Theory of Numbers. Hermann; Paris, France: 1970. [Google Scholar]
- 40.Stewart I.N., Tall D.O. Algebraic Number Theory and Fermat’s Last Theorem: Third Edition. 3rd ed. A K Peters/CRC Press; New York, NY, USA: 2001. [DOI] [Google Scholar]
- 41.Ribenboim P. Classical Theory of Algebraic Numbers. Universitext, Springer; New York, NY, USA: 2001. [DOI] [Google Scholar]
- 42.Peikert C. Limits on the Hardness of Lattice Problems in ℓp Norms. Comput. Complex. 2008;17:300–351. doi: 10.1007/s00037-008-0251-3. [DOI] [Google Scholar]
- 43.Bayer-Fluckiger E., Oggier F., Viterbo E. New algebraic constructions of rotated ℤn-lattice constellations for the Rayleigh fading channel. IEEE Trans. Inf. Theory. 2004;50:702–714. doi: 10.1109/TIT.2004.825045. [DOI] [Google Scholar]
- 44.Oggier F., Viterbo E. Algebraic Number Theory and Code Design for Rayleigh Fading Channels. Commun. Inf. Theory. 2004;1:333–416. doi: 10.1561/0100000003. [DOI] [Google Scholar]
- 45.Aranés M., Arenas A. On the defining polynomials of maximal real cyclotomic extensions. Rev. Real Acad. Cienc. Exactas FÍsicas y Nat. Ser. A. Mat. 2008;101:187–203. doi: 10.1007/BF03191817. [DOI] [Google Scholar]
- 46.Chu E., George A. Inside the FFT Black Box–Serial and Parallel Fast Fourier Transform Algorithms. CRC Press; Boca Raton, FL, USA: 2000. [Google Scholar]
- 47.Lyubashevsky V., Micciancio D. Generalized Compact Knapsacks Are Collision Resistant. In: Bugliesi M., Preneel B., Sassone V., Wegener I., editors. Automata, Languages and Programming. Springer; Berlin/Heidelberg, Germany: 2006. pp. 144–155. [Google Scholar]