CryptoDB
Alexandre Wallet
Publications
Year
Venue
Title
2024
EUROCRYPT
Cryptanalysis of rank-2 module-LIP in totally real number fields
Abstract
We formally define the Lattice Isomorphism Problem for module lattices (module-LIP) in a number field K. This is a generalization of the problem defined by Ducas, Postlethwaite, Pulles, and van Woerden (Asiacrypt 2022), taking into account the arithmetic and algebraic specificity of module lattices from their representation using pseudo-bases.
We also provide the corresponding set of algorithmic and theoretical tools for the future study of this problem in a module setting.
Our main contribution is an algorithm solving module-LIP for modules of rank 2 in K^2, when K is a totally real number field.
Our algorithm exploits the connection between this problem, relative norm equations and the decomposition of algebraic integers as sums of two squares.
For a large class of modules, including O_K^2, it runs in classical polynomial time (under reasonable number theoretic assumptions).
We provide a proof-of-concept code running over the maximal real subfield of cyclotomic fields.
2023
ASIACRYPT
On Gaussian sampling, smoothing parameter and application to signatures
Abstract
We present a general framework for polynomial-time lattice Gaussian
sampling. It revolves around a systematic study of the discrete
Gaussian measure and its samplers under \emph{extensions} of lattices;
we first show that given lattices $\Lat'\subset \Lat$ we can sample
efficiently in $\Lat$ if we know how to do so in $\Lat'$ and the
quotient $\Lat/\Lat'$, \emph{regardless} of the primitivity of
$\Lat'$. As a direct application, we tackle the problem of domain
extension and restriction for sampling and propose a sampler tailored
for lattice \emph{filtrations}, which can be seen as a broad
generalization of the celebrated Klein's sampler. Then, we demonstrate
how to sample using a change of bases, or even switching the ambient
space, even when the target lattice is not represented as full-rank in
the ambient space. We show how to correct the induced distortion with
the ``convolution-like'' technique of Peikert (Crypto 2010)
(which we encompass as a byproduct). Since our framework aims at
modularity and leverage the combinations of smaller samplers to build
new ones, we also propose ad-hoc samplers for the so-called \emph{root
lattices} $\An_n, \Dn_n, \mathsf{E}_n$ as base cases, extending the
state-of-the-art for root lattice sampling, which was limited to
$\ZZ^n$. We also show how our framework blends with the so-called
$k$ing construction and provides a sampler for the remarkable Leech and
Barnes-Wall lattices.
As a by-product, we obtain novel, quasi-linear samplers
for prime and smooth conductor (as $2^\ell 3^k$) cyclotomic rings,
achieving essentially optimal Gaussian width. In a practice-oriented
application, we showcase the impact of our work on hash-and-sign
signatures over \textsc{ntru} lattices. In the best case, we can gain
around 200 bytes (which corresponds to an improvement greater than
20\%) on the signature size. We also improve the new gadget-based
constructions (Yu, Jia, Wang, Crypto 2023) and gain up to 110 bytes for the
resulting signatures.
Lastly, we sprinkle our exposition with several new estimates for the
smoothing parameter of lattices, stemming from our algorithmic
constructions and by novel methods based on series reversion.
2023
ASIACRYPT
Antrag: Annular NTRU Trapdoor Generation
Abstract
In this paper, we introduce a novel trapdoor generation technique for Prest's hybrid sampler over NTRU lattices. Prest's sampler is used in particular in the recently proposed Mitaka signature scheme (Eurocrypt 2022), a variant of the Falcon signature scheme, one of the candidates selected by NIST for standardization. Mitaka was introduced to address Falcon's main drawback, namely the fact that the lattice Gaussian sampler used in its signature generation is highly complex, difficult to implement correctly, to parallelize or protect against side-channels, and to instantiate over rings of dimension not a power of two to reach intermediate security levels. Prest's sampler is considerably simpler and solves these various issues, but when applying the same trapdoor generation approach as Falcon, the resulting signatures have far lower security in equal dimension. The Mitaka paper showed how certain randomness-recycling techniques could be used to mitigate this security loss, but the resulting scheme is still substantially less secure than Falcon (by around 20 to 50 bits of CoreSVP security depending on the parameters), and has much slower key generation.
Our new trapdoor generation techniques solves all of those issues satisfactorily: it gives rise to a much simpler and faster key generation algorithm than Mitaka's (achieving similar speeds to Falcon), and is able to comfortably generate trapdoors reaching the same NIST security levels as Falcon as well. It can also be easily adapted to rings of intermediate dimensions, in order to support the same versatility as Mitaka in terms of parameter selection. All in all, this new technique combines all the advantages of both Falcon and Mitaka (and more) with none of the drawbacks.
2022
EUROCRYPT
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon
📺
Abstract
This work describes the Mitaka signature scheme: a new hash-and-sign
signature scheme over NTRU lattices which can be seen as a variant of
NIST finalist Falcon. It achieves comparable efficiency but is
considerably simpler, online/offline, and easier to parallelize and
protect against side-channels, thus offering significant advantages from
an implementation standpoint. It is also much more versatile in terms of
parameter selection.
We obtain this signature scheme by replacing the FFO lattice Gaussian
sampler in Falcon by the “hybrid” sampler of Ducas and Prest, for
which we carry out a detailed and corrected security analysis. In
principle, such a change can result in a substantial security loss, but
we show that this loss can be largely mitigated using new techniques in
key generation that allow us to construct much higher quality lattice
trapdoors for the hybrid sampler relatively cheaply. This new approach
can also be instantiated on a wide variety of base fields, in contrast
with Falcon's restriction to power-of-two cyclotomics.
We also introduce a new lattice Gaussian sampler with the same quality
and efficiency, but which is moreover compatible with the integral matrix
Gram root technique of Ducas et al., allowing us to avoid floating point
arithmetic. This makes it possible to realize the same signature
scheme as Mitaka efficiently on platforms with poor support for
floating point numbers.
Finally, we describe a provably secure masking of Mitaka. More precisely,
we introduce novel gadgets that allow provable masking at any order at much
lower cost than previous masking techniques for Gaussian sampling-based
signature schemes, for cheap and dependable side-channel protection.
2022
CRYPTO
Shorter Hash-and-Sign Lattice-Based Signatures
📺
Abstract
Lattice-based digital signature schemes following the hash-and-sign design paradigm of Gentry, Peikert and Vaikuntanathan (GPV) tend to offer an attractive level of efficiency, particularly when instantiated with structured compact trapdoors. In particular, NIST postquantum finalist Falcon is both quite fast for signing and verification and quite compact: NIST notes that it has the smallest bandwidth (as measured in combined size of public key and signature) of all round 2 digital signature candidates. Nevertheless, while Falcon--512, for instance, compares favorably to ECDSA--384 in terms of speed, its signatures are well over 10 times larger. For applications that store large number of signatures, or that require signatures to fit in prescribed packet sizes, this can be a critical limitation.
In this paper, we explore several approaches to further improve the size of hash-and-sign lattice-based signatures, particularly instantiated over NTRU lattices like Falcon and its recent variant Mitaka. In particular, while GPV signatures are usually obtained by sampling lattice points according to some *spherical* discrete Gaussian distribution, we show that it can be beneficial to sample instead according to a suitably chosen *ellipsoidal* discrete Gaussian: this is because only half of the sampled Gaussian vector is actually output as the signature, while the other half is recovered during verification. Making the half that actually occurs in signatures shorter reduces signature size at essentially no security loss (in a suitable range of parameters). Similarly, we show that reducing the modulus $q$ with respect to which signatures are computed can improve signature size as well as verification key size almost ``for free''; this is particularly true for constructions like Falcon and Mitaka that do not make substantial use of NTT-based multiplication (and rely instead on transcendental FFT). Finally, we show that the Gaussian vectors in signatures can be represented in a more compact way with appropriate coding-theoretic techniques, improving signature size by an additional 7 to 14%. All in all, we manage to reduce the size of, e.g., Falcon signatures by 30--40% at the cost of only 4--6 bits of Core-SVP security.
2020
EUROCRYPT
Key Recovery from Gram--Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
📺
Abstract
In this paper, we initiate the study of side-channel leakage in hash-and-sign lattice-based signatures, with particular emphasis on the two efficient implementations of the original GPV lattice-trapdoor paradigm for signatures, namely NIST second-round candidate Falcon and its simpler predecessor DLP. Both of these schemes implement the GPV signature scheme over NTRU lattices, achieving great speed-ups over the general lattice case. Our results are mainly threefold.
First, we identify a specific source of side-channel leakage in most implementations of those schemes, namely, the one-dimensional Gaussian sampling steps within lattice Gaussian sampling. It turns out that the implementations of these steps often leak the Gram--Schmidt norms of the secret lattice basis.
Second, we elucidate the link between this leakage and the secret key, by showing that the entire secret key can be efficiently reconstructed solely from those Gram--Schmidt norms. The result makes heavy use of the algebraic structure of the corresponding schemes, which work over a power-of-two cyclotomic field.
Third, we concretely demonstrate the side-channel attack against DLP (but not Falcon due to the different structures of the two schemes). The challenge is that timing information only provides an approximation of the Gram--Schmidt norms, so our algebraic recovery technique needs to be combined with pruned tree search in order to apply it to approximate values. Experimentally, we show that around $2^{35}$ DLP traces are enough to reconstruct the entire key with good probability.
2019
ASIACRYPT
An LLL Algorithm for Module Lattices
Abstract
The LLL algorithm takes as input a basis of a Euclidean lattice, and, within a polynomial number of operations, it outputs another basis of the same lattice but consisting of rather short vectors. We provide a generalization to R-modules contained in
$$K^n$$
for arbitrary number fields K and dimension n, with R denoting the ring of integers of K. Concretely, we introduce an algorithm that efficiently finds short vectors in rank-n modules when given access to an oracle that finds short vectors in rank-2 modules, and an algorithm that efficiently finds short vectors in rank-2 modules given access to a Closest Vector Problem oracle for a lattice that depends only on K. The second algorithm relies on quantum computations and its analysis is heuristic.
Program Committees
- Asiacrypt 2023
Coauthors
- Thomas Espitau (4)
- Pierre-Alain Fouque (2)
- François Gérard (1)
- Paul Kirchner (1)
- Changmin Lee (1)
- Guilhem Mureau (1)
- Thi Thu Quyen Nguyen (1)
- Alice Pellet-Mary (2)
- Georges Pliatsok (1)
- Miruna Rosca (1)
- Mélissa Rossi (1)
- Damien Stehlé (2)
- Chao Sun (1)
- Akira Takahashi (1)
- Mehdi Tibouchi (4)
- Alexandre Wallet (8)
- Yang Yu (4)