Cryptography Learning Seminar

Speaker: 

Shahed Sharif

Institution: 

CSUSM and UCI

Time: 

Monday, April 3, 2017 - 3:00pm

Host: 

Location: 

RH 440R

I will be talking about two theoretical attacks on lattice-based
cryptography mentioned by Dan Bernstein; here, "theoretical" means that
there is no known implementation. One is the subfield logarithm attack,
which generalizes a known attack on PIP over CM fields. The second is an
attack that attempts to reduce the standard lattice attack on NTRU into
a case of SPIP in an extension field.

Cryptography Learning Seminar

Speaker: 

Shahed Sharif

Institution: 

CSU-SM and UCI

Time: 

Monday, March 6, 2017 - 3:00pm

Host: 

Location: 

RH 306

We will give a recap of last week's seminar talk on the Cramer-Ducas-Peikert-Regev paper, and discuss some of the technical aspects of cyclotomic unit lattices that arose. We also give a short overview of the NTRU Prime article, which will serve as a prelude to a more substantive discussion in a future session.

Organizational Meeting for the Mathematics of Cryptography reading seminar

Speaker: 

Shahed Sharif and Alice Silverberg

Institution: 

UCI

Time: 

Monday, January 30, 2017 - 2:00pm to 3:00pm

Host: 

Location: 

RH 340N

This is an Organizational Meeting for the Mathematics of Cryptography reading/learning seminar. We will read and report on some cryptography articles for which mathematics might be helpful in making further progress, and we will explore the associated mathematics, as necessary.

If you have suggested topics, or suggested papers for the group to read, please send an email with your suggestions to asilverb@uci.edu in advance of the meeting. Thanks!

Practical Public Key Encryption Based on Lattices

Speaker: 

Jung-Hee Cheon

Institution: 

Seoul National University

Time: 

Wednesday, January 25, 2017 - 2:00pm

Location: 

Building CS1, room 432 - NOTE THE UNUSUAL LOCATION

The Learning with Errors (LWE) hardness assumption is one of the most promising primitive for post-quantum cryptography due to its strong security reduction from the worst-case of NP-hard problems and its lightweight operations. The Public Key Encryption (PKE) scheme based on LWE has a simple and fast decryption, but its encryption is rather slow due to large parameter sizes for Leftover Hash Lemma or expensive Gaussian samplings.

In this talk, we introduce a novel PKE without relying on either of them. For encryption, we first combine several LWE instances as in the previous LWE-based PKEs. However, the following step to re-randomize this combination before adding a message is different: remove several least significant bits of ciphertexts rather than inserting errors. We prove that our scheme is IND-CPA secure under the hardness of LWE and can be converted into an IND-CCA scheme in the quantum random oracle model.

Our approach accelerates encryption speed to a large extent and also reduces the size of ciphertexts. The proposed scheme is very competitive for all applications requiring both of fast encryption and decryption. In our single-core implementation in Macbook Pro, encryption and decryption of a 128-bit message for quantum 128-bit security take 7 and 6 microseconds that are 3.4 and 4.2 times faster than those of NTRU PKE, respectively. To achieve these results, we further take some advantage of sparse small secrets, under which the security of our scheme is also proved.

We will also talk about recent announcement on NIST's call-for-proposal for post-quantum crypto.

This talk is based on the preprint in http://eprint.iacr.org/2016/1126.

Pages

Subscribe to RSS - Cryptography