Non-squeezing theorem

From formulasearchengine
Revision as of 14:59, 20 March 2013 by en>Addbot (Bot: Migrating 1 interwiki links, now provided by Wikidata on d:q3527214)
Jump to navigation Jump to search

Learning with errors (LWE) is a problem in machine learning that is conjectured to be hard to solve. It is a generalization of the parity learning problem, introduced[1] by Oded Regev in 2005. Regev showed, furthermore, that the LWE problem is as hard to solve as several worst-case lattice problems. The LWE problem has recently[1][2] been used as a hardness assumption to create public-key cryptosystems.

An algorithm is said to solve the LWE problem if, when given access to samples (x,y) where xqn and yq, with the assurance, for some fixed linear function f:qnq, that y=f(x) with high probability and deviates from it according to some known noise model, the algorithm can recreate f or some close approximation of it with high probability.

Definition

Denote by 𝕋=/ the additive group on reals modulo one. Denote by As,ϕ the distribution on qn×𝕋 obtained by choosing a vector aqn uniformly at random, choosing e according to a probability distribution ϕ on 𝕋 and outputting (a,a,s/q+e) for some fixed vector sqn where the division is done in the field of reals, and the addition in 𝕋.

The learning with errors problem LWEq,ϕ is to find sqn, given access to polynomially many samples of choice from As,ϕ.

For every α>0, denote by Dα the one-dimensional Gaussian with density function Dα(x)=ρα(x)/α where ρα(x)=eπ(|x|/α)2, and let Ψα be the distribution on 𝕋 obtained by considering Dα modulo one. The version of LWE considered in most of the results would be LWEq,Ψα

Decision version

The LWE problem described above is the search version of the problem. In the decision version (DLWE), the goal is to distinguish between noisy inner products and uniformly random samples from qn×𝕋 (practically, some discretized version of it). Regev[1] showed that the decision and search versions are equivalent when q is a prime bounded by some polynomial in n.

Solving decision assuming search

Intuitively, if we have a procedure for the search problem, the decision version can be solved easily: just feed the input samples for the decision problem to the solver for the search problem. Denote the given samples by {(ai,bi)}qn×𝕋. If the solver returns a candidate s, for all i, calculate {ai,sbi}. If the samples are from an LWE distribution, then the results of this calculation will be distributed according χ, but if the samples are uniformly random, these quantities will be distributed uniformly as well.

Solving search assuming decision

For the other direction, given a solver for the decision problem, the search version can be solved as follows: Recover s one coordinate at a time. To obtain the first coordinate, s1, make a guess kZq, and do the following. Choose a number rq uniformly at random. Transform the given samples {(ai,bi)}qn×𝕋 as follows. Calculate {(ai+(r,0,,0),bi+(rk)/q)}. Send the transformed samples to the decision solver.

If the guess k was correct, the transformation takes the distribution As,χ to itself, and otherwise, since q is prime, it takes it to the uniform distribution. So, given a polynomial-time solver for the decision problem that errs with very small probability, since q is bounded by some polynomial in n, it only takes polynomial time to guess every possible value for k and use the solver to see which one is correct.

After obtaining s1, we follow an analogous procedure for each other coordinate sj. Namely, we transform our bi samples the same way, and transform our ai samples by calculating ai+(0,,r,,0), where the r is in the jth coordinate. [1]

Peikert[2] showed that this reduction, with a small modification, works for any q that is a product of distinct, small (polynomial in n) primes. The main idea is if q=q1q2qt, for each q, guess and check to see if sj is congruent to 0modq, and then use the Chinese remainder theorem to recover sj.

Average case hardness

Regev[1] showed the Random self-reducibility of the LWE and DLWE problems for arbitrary q and χ. Given samples {(ai,bi)} from As,χ, it is easy to see that {(ai,bi)+(ai,t)/q} are samples from As+t,χ.

So, suppose there was some set 𝒮qn such that |𝒮|/|qn|=1/poly(n), and for distributions As,χ, with s𝒮, DLWE was easy.

Then there would be some distinguisher 𝒜, who, given samples {(ai,bi)}, could tell whether they were uniformly random or from As,χ. If we need to distinguish uniformly random samples from As,χ, where s is chosen uniformly at random from qn, we could simply try different values t sampled uniformly at random from qn, calculate {(ai,bi)+(ai,t)/q} and feed these samples to 𝒜. Since 𝒮 comprises a large fraction of qn, with high probability, if we choose a polynomial number of values for t, we will find one such that s+t𝒮, and 𝒜 will successfully distinguish the samples.

Thus, no such 𝒮 can exist, meaning LWE and DLWE are (up to a polynomial factor) as hard in the average case as they are in the worst case.

Hardness results

Regev's result

For a n-dimensional lattice L, let smoothing parameter ηϵ(L) denote the smallest s such that ρ1/s(L*{0})ϵ where L* is the dual of L and ρα(x)=eπ(|x|/α)2 is extended to sets by summing over function values at each element in the set. Let DL,r denote the discrete Gaussian distribution on L of width r for a lattice L and real r>0. The probability of each xL is proportional to ρr(x).

The discrete Gaussian sampling problem(DGS) is defined as follows: An instance of DGSϕ is given by an n-dimensional lattice L and a number rϕ(L). The goal is to output a sample from DL,r. Regev shows that there is a reduction from GapSVP100nγ(n) to DGSnγ(n)/λ(L*) for any function γ(n).

Regev then shows that there exists an efficient quantum algorithm for DGS2nηϵ(L)/α given access to an oracle for LWEq,Ψα for integer q and α(0,1) such that αq>2n. This implies the hardness for LWE. Although the proof of this assertion works for any q, for creating a cryptosystem, the q has to be polynomial in n.

Peikert's result

Peikert proves[2] that there is a probabilistic polynomial time reduction from the GapSVPζ,γ problem in the worst case to solving LWEq,Ψα using poly(n) samples for parameters α(0,1), γ(n)n/(αlogn), ζ(n)γ(n) and q(ζ/n)ωlogn).

Use in Cryptography

The LWE problem serves as a versatile problem used in construction of several[1][2][3][4] cryptosystems. In 2005, Regev[1] showed that the decision version of LWE is hard assuming quantum hardness of the lattice problems GapSVPγ (for γ as above) and SIVPt with t=Õ(n/α). In 2009, Peikert[2] proved a similar result assuming only the classical hardness of the related problem GapSVPζ,γ. The disadvantage of Peikert's result is that it bases itself on a non-standard version of an easier (when compared to SIVP) problem GapSVP.

Public-key cryptosystem

Regev[1] proposed a public-key cryptosystem based on the hardness of the LWE problem. The cryptosystem as well as the proof of security and correctness are completely classical. The system is characterized by m,q and a probability distribution χ on 𝕋. The setting of the parameters used in proofs of correctness and security is

The cryptosystem is then defined by:

The proof of correctness follows from choice of parameters and some probability analysis. The proof of security is by reduction to the decision version of LWE: an algorithm for distinguishing between encryptions (with above parameters) of 0 and 1 can be used to distinguish between As,χ and the uniform distribution over qn×q

CCA-secure cryptosystem

Template:Expand section Peikert[2] proposed a system that is secure even against any chosen-ciphertext attack.

See also

References

  1. 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Oded Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Baltimore, MD, USA: ACM, 2005), 84-93, http://portal.acm.org/citation.cfm?id=1060590.1060603.
  2. 2.0 2.1 2.2 2.3 2.4 2.5 Chris Peikert, “Public-key cryptosystems from the worst-case shortest vector problem: extended abstract,” in Proceedings of the 41st annual ACM symposium on Theory of computing (Bethesda, MD, USA: ACM, 2009), 333-342, http://portal.acm.org/citation.cfm?id=1536414.1536461.
  3. Chris Peikert and Brent Waters, “Lossy trapdoor functions and their applications,” in Proceedings of the 40th annual ACM symposium on Theory of computing (Victoria, British Columbia, Canada: ACM, 2008), 187-196, http://portal.acm.org/citation.cfm?id=1374406.
  4. Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan, “Trapdoors for hard lattices and new cryptographic constructions,” in Proceedings of the 40th annual ACM symposium on Theory of computing (Victoria, British Columbia, Canada: ACM, 2008), 197-206, http://portal.acm.org/citation.cfm?id=1374407.