Abstract
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems (Eisentraeger et al., Weak Instances of PLWE. In: Proceedings of the selected areas of cryptography 2014. Lecture notes in computer science. Springer, New York, 2014; Elias Y., Lauter K., Ozman E., Stange K., Provably weak instances of ring-LWE. In: Advances in Cryptology – CRYPTO 2015. Springer, 2015 gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebraic number and its relationship to Mahler measure, the monogenic property for the ring of integers of a number field, and the size of elements of small order modulo q.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Meaning residue of smallest absolute value.
References
Ajtai, M.: Generating hard instances of lattice problems. In: Complexity of Computations and Proofs. Quadeni di Matematica, vol. 13, pp. 1–32 (2004). Preliminary version in STOC 1996
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing, pp. 284–293 (1997)
Archinard, G.: Extensions cubiques cycliques de Q dont l’anneau des entiers est monogène. Enseignement Math. 20 (2), 179–203 (1974)
Bouniakowski, V.: Sur les diviseurs numériques invariables des fonctions rationelles entières. Mem. Acad. Sci. St. Petersburg 6, 305–329 (1857)
Bourgain, J.: On the distribution of the residues of small multiplicative subgroups of \(\mathbb{F}_{p}\). Israel J. Math. 172, 61–74 (2009)
Bourgain, J., Konyagin, S.V., Shparlinski, I.E.: Product sets of rationals, multiplicative translates of subgroups in residue rings, and fixed points of the discrete logarithm. Int. Math. Res. Not. rnn 090 (2008)
Bourgain, J., Konyagin, S.V., Shparlinski, I.E.: Distribution of elements of cosets of small subgroups and applications. Int. Math. Res. Not. 9, 1968–2009 (2012)
Bos, J.W., Lauter, K., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inform. (2014). doi:10.1016/j.jbi.2014.04.003
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from RLWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 6841, pp. 505–524. Springer, New York (2011)
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43 (2), 831–871 (2014)
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309–325. Association for Computing Machinery, New York (2011)
Ducas, L., Durmus, A.: RLWE in polynomial rings. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012. Lecture Notes in Computer Science, vol. 7293 (2012)
Dummit, D.S., Kisilevsky, H.: Indices in cyclic cubic fields. In: Number Theory and Algebra, pp. 29–42. Academic, London (1977)
Eisentraeger, K., Hallgren, S., Lauter, K.: Weak Instances of PLWE. In: Proceedings of Selected Areas of Cryptography 2014. Lecture Notes in Computer Science. Springer, New York (2014)
Elias, Y., Lauter, K., Ozman, E., Stange, K.: Provably weak instances of ring-LWE. In: Advances in Cryptology – CRYPTO 2015, pp. 63–92. Springer (2015). doi:10.1007/978-3-662-47989-6
Elliott, P.D.T.A.: A problem of Erdős concerning power residue sums. Acta Arith. 13, 131–149 (1967/1968)
Erdos, P.: On the coefficients of the Erdos polynomial. Bull. Am. Math. Soc. 52 (2), 179–184 (1946)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 40th ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Gentry, C., Halevi, S., Smart, N.P.: Fully homomorphic encryption with polylog overhead, Cryptology ePrint Archive, Report 2011/566, Eurocrypt 2012 (2011)
Graepel, T., Lauter, K., Naehrig, M.: ML Confidential: Machine Learning on Encrypted Data, International Conference on Information Security and Cryptology – ICISC 2012. Lecture Notes in Computer Science. Springer, Berlin (2012)
Gras, M.-N.: Sur les corps cubiques cycliques dont l’anneau des entiers est monogéne. Ann. Sci. Univ. Besan. Math. 3 (6), 26 (1973)
Gras, M.-N.: Condition necessaire de monogeneite de l’anneau des entiers d’une extension abelienne de \(\mathbb{Q}\), Seminare de theorie des nombres(Paris, 1984/1985). Prog. in Math. Birkhauser, Basel
Gras, M.-N.: Non monogeneite de l’anneau des entiers des extensions cycliques de \(\mathbb{Q}\) de degre premier ℓ ≥ 5. J. Number Theory 23 (3), 347–353 (1986)
Hoffstein, J., Pipher, J., Silverman, J.: NTRU: a ring based public key cryptosystem. In: Proceedings of ANTS-III. Lecture Notes in Computer Science, vol. 1423, pp. 267–288. Springer, Berlin (1998)
Kedlaya, K.: A construction of polynomials with squarefree discriminants. Proc. Amer. Math. Soc. 140, 3025–3033 (2012)
Konyagin, S.V., Shparlinski, I.E.: Character sums with exponential functions and their applications. Cambridge Tracts in Mathematics, vol. 136. Cambridge University Press, Cambridge (1999)
Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: CCSW 2011, ACM Cloud Computing Security Workshop (2011)
Lauter, K., Lopez-Alt, A., Naehrig, M.: Private Computation on Encrypted Genomic Data. LatinCrypt 2014 (GenoPri 2014)
Lindner, R., Peikert, C.: Better key sizes (and attacks) for LWE-based encryption. In: CT-RSA 2011 (2011)
Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Eurocrypt 2010. Lecture Notes in Computer Science (2010). See also journal version: J. ACM (JACM) 60 (6), 43
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post-Quantum Cryptography, pp. 147–191. Springer, Berlin (2009)
Migotti, A.: Zur theorie der kreisteilungsgleichung, Z. B. der Math.-Naturwiss. Classe der Kaiserlichen Akademie der Wissenschaften, Wein 87, 7–14 (1883)
Murty, M.R., Petersen, K.L.: The Euclidean algorithm for number fields and primitive roots. Proc. Amer. Math. Soc. 141 (1), 181–190 (2013)
Nakahara, T., Shah, S.: Monogenesis of the rings of integers in certain imaginary abelian fields. Nagoya Math. J. 168, 85–92 (2002)
Nikiforov, V.: Revisiting Schur’s bound on the largest singular value (2007). http://arxiv.org/abs/math/0702722
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56 (6), 40 (2009). Art. 34 (Preliminary version STOC 2005)
Rückert, M., Schneider, M.: Selecting secure parameters for lattice-based cryptography. Cryptology ePrint Archive, Report 2010/137 (2010)
Samuel, P.: About Euclidean rings. J. Algebra 19, 282–301 (1971)
Acknowledgements
The authors thank the organizers of the research conference Women in Numbers 3 (Rachel Pries, Ling Long and the fourth author) and the Banff International Research Station, for making this collaboration possible. The authors also thank the anonymous referee for detailed comments and suggestions to improve the paper, and Igor Shparlinski for useful feedback and references.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Elias, Y., Lauter, K.E., Ozman, E., Stange, K.E. (2016). Ring-LWE Cryptography for the Number Theorist. In: Eischen, E., Long, L., Pries, R., Stange, K. (eds) Directions in Number Theory. Association for Women in Mathematics Series, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-30976-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-30976-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30974-3
Online ISBN: 978-3-319-30976-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)