Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-031-37679-5_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Quantum Search-to-Decision Reduction for the LWE Problem

Published: 19 July 2023 Publication History

Abstract

The learning with errors (LWE) problem is one of the fundamental problems in cryptography and it has many applications in post-quantum cryptography. There are two variants of the problem, the decisional-LWE problem, and the search-LWE problem. LWE search-to-decision reduction shows that the hardness of the search-LWE problem can be reduced to the hardness of the decisional-LWE problem. The efficiency of the reduction can be regarded as the gap in difficulty between the problems.
We initiate a study of quantum search-to-decision reduction for the LWE problem and propose a reduction that satisfies sample-preserving. In sample-preserving reduction, it preserves all parameters even the number of instances. Especially, our quantum reduction invokes the distinguisher only 2 times to solve the search-LWE problem, while classical reductions require a polynomial number of invocations. Furthermore, we give a way to amplify the success probability of the reduction algorithm. Our amplified reduction works with fewer LWE samples compared to the classical reduction that has a high success probability. Our reduction algorithm supports a wide class of error distributions and also provides a search-to-decision reduction for the learning parity with noise problem.
In the process of constructing the search-to-decision reduction, we give a quantum Goldreich-Levin theorem over Zq where q is prime. In short, this theorem states that, if a hardcore predicate a·s(modq) can be predicted with probability distinctly greater than 1/q with respect to a uniformly random aZqn, then it is possible to determine sZqn.

References

[2]
Adcock M and Cleve R Alt H and Ferreira A A quantum Goldreich-Levin Theorem with cryptographic applications STACS 2002 2002 Heidelberg Springer 323-334
[3]
Agrawal S, Boneh D, and Boyen X Gilbert H Efficient lattice (H)IBE in the standard model Advances in Cryptology – EUROCRYPT 2010 2010 Heidelberg Springer 553-572
[4]
Akavia, A.: Learning noisy characters, MPC, and cryptographic hardcore predicates. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2008)
[5]
Ananth, P., Poremba, A., Vaikuntanathan, V.: Revocable cryptography from learning with errors. Cryptology ePrint Archive, Paper 2023/325 (2023). https://eprint.iacr.org/2023/325
[6]
Applebaum B, Cash D, Peikert C, and Sahai A Halevi S Fast cryptographic primitives and circular-secure encryption based on hard learning problems Advances in Cryptology - CRYPTO 2009 2009 Heidelberg Springer 595-618
[7]
Applebaum B, Ishai Y, and Kushilevitz E Menezes A Cryptography with constant input locality Advances in Cryptology - CRYPTO 2007 2007 Heidelberg Springer 92-110
[8]
Bitansky N, Brakerski Z, and Kalai YT Dodis Y and Shrimpton T Constructive post-quantum reductions Advances in Cryptology—CRYPTO 2022 2022 Cham Springer 654-683
[9]
Brakerski, Z., Langlois, A., Peikert, C., Regev, O., Stehlé, D.: Classical hardness of learning with errors. In: Boneh, D., Roughgarden, T., Feigenbaum, J (eds.) Symposium on Theory of Computing Conference, STOC 2013, Palo Alto, CA, USA, 1–4 June 1–4 2013, pp. 575–584. ACM (2013)
[10]
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky, R (ed.) IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, 22–25 October 22–25 2011, pp. 97–106. IEEE Computer Society (2011)
[11]
Brassard, G., Hoyer, P., Mosca, M., Tapp, A.: Quantum Amplitude Amplification and Estimation (2002)
[12]
Cash D, Hofheinz D, Kiltz E, and Peikert C Gilbert H Bonsai trees, or how to delegate a lattice basis Advances in Cryptology – EUROCRYPT 2010 2010 Heidelberg Springer 523-552
[13]
Dodis Y, Goldwasser S, Tauman Kalai Y, Peikert C, and Vaikuntanathan V Micciancio D Public-key encryption schemes with auxiliary inputs Theory of Cryptography 2010 Heidelberg Springer 361-381
[14]
Döttling N Katz J Low noise LPN: KDM secure public key encryption and sample amplification Public-Key Cryptography – PKC 2015 2015 Heidelberg Springer 604-626
[15]
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C (ed.) Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, 17–20 May 17–20 2008, pp. 197–206. ACM (2008)
[16]
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Johnson, D.S (ed.), Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 14–17 May 14–17 1989, Seattle, Washington, USA, pp. 25–32. ACM (1989)
[17]
Grigorescu E, Kopparty S, and Sudan M Díaz J, Jansen K, Rolim JDP, and Zwick U Local decoding and testing for homomorphisms Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques 2006 Heidelberg Springer 375-385
[18]
Katz J and Shin JS Vaudenay S Parallel and concurrent security of the HB and HB+ protocols Advances in Cryptology - EUROCRYPT 2006 2006 Heidelberg Springer 73-87
[19]
Li H Quantum algorithms for the Goldreich-Levin learning problem Quantum Inf. Process. 2020 19 10 395
[20]
Micciancio D and Mol P Rogaway P Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions Advances in Cryptology – CRYPTO 2011 2011 Heidelberg Springer 465-484
[21]
Micciancio D and Peikert C Pointcheval D and Johansson T Trapdoors for lattices: simpler, tighter, faster, smaller Advances in Cryptology – EUROCRYPT 2012 2012 Heidelberg Springer 700-718
[22]
Newton, P.: Novel Linearity Tests with Applications to Lattices and Learning Problems. PhD thesis, UC Riverside (2022)
[23]
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Mitzenmacher, M (Ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31–June 2 2009, pp. 333–342. ACM (2009)
[24]
Peikert C, Vaikuntanathan V, and Waters B Wagner D A framework for efficient and composable oblivious transfer Advances in Cryptology – CRYPTO 2008 2008 Heidelberg Springer 554-571
[25]
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R (ed.) Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 22–24 May 22–24 2005, pp. 84–93. ACM (2005)
[26]
Vaikuntanathan, V.: Lattices, learning with errors and post-quantum cryptography. https://people.csail.mit.edu/vinodv/CS294/lecturenotes.pdf

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Progress in Cryptology - AFRICACRYPT 2023: 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19–21, 2023, Proceedings
Jul 2023
517 pages
ISBN:978-3-031-37678-8
DOI:10.1007/978-3-031-37679-5

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 July 2023

Author Tags

  1. Learning with errors
  2. Learning parity with noise
  3. Search-to-decision reduction
  4. Goldreich-Levin theorem
  5. Quantum reduction
  6. Query complexity
  7. Sample complexity

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media