Göpfert, Florian (2016)
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
|
Text
Thesis_f_goepfert.pdf Copyright Information: CC BY-NC-ND 4.0 International - Creative Commons, Attribution NonCommercial, NoDerivs. Download (6MB) | Preview |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption | ||||
Language: | English | ||||
Referees: | Buchman, Prof. Dr. Johannes ; Ding, Prof. Dr. Jintai | ||||
Date: | 2016 | ||||
Place of Publication: | Darmstadt | ||||
Date of oral examination: | 22 September 2016 | ||||
Abstract: | Since its proposal by Regev in 2005, the Learning With Errors (LWE) problem was used as the underlying problem for a great variety of schemes. Its applications are many-fold, reaching from basic and highly practical primitives like key exchange, public-key encryption, and signature schemes to very advanced solutions like fully homomorphic encryption, group signatures, and identity based encryption. One of the underlying reasons for this fertility is the flexibility with that LWE can be instantiated. Unfortunately, this comes at a cost: It makes selecting parameters for cryptographic applications complicated. When selecting parameters for a new LWE-based primitive, a researcher has to take the influence of several parameters on the efficiency of the scheme and the runtime of a variety of attacks into consideration. In fact, the missing trust in the concrete hardness of LWE is one of the main problems to overcome to bring LWE-based schemes to practice. This thesis aims at closing the gap between the theoretical knowledge of the hardness of LWE, and the concrete problem of selecting parameters for an LWE-based scheme. To this end, we analyze the existing methods to estimate the hardness of LWE, and introduce new estimation techniques where necessary. Afterwards, we show how to transfer this knowledge into instantiations that are at the same time secure and efficient. We show this process on three examples: - A highly optimized public-key encryption scheme for embedded devices that is based on a variant of Ring-LWE. - A practical signature scheme that served as the foundation of one of the best lattice-based signature schemes based on standard lattices. - An advanced public-key encryption scheme that enjoys the unique property of natural double hardness based on LWE instances similar to those used for fully homomorphic encryption. |
||||
Alternative Abstract: |
|
||||
URN: | urn:nbn:de:tuda-tuprints-58505 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Cryptography and Complexity Theory |
||||
Date Deposited: | 09 Dec 2016 08:44 | ||||
Last Modified: | 09 Jul 2020 01:29 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/5850 | ||||
PPN: | 396490964 | ||||
Export: |
View Item |