TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A subfield-logarithm attack against ideal lattices

89 点作者 pedro84超过 11 年前

3 条评论

pbsd超过 11 年前
This sort of thing is a recurring theme in cryptography:<p>1. Someone proposes a scheme based on Hard Problem X. X looks strong, but the resulting scheme either is too slow or has gigantic keys.<p>2. Someone else comes along and proposes a related scheme based on Hard Problem Y which, having more structure, allows for either smaller keys or faster computation.<p>3. Later turns out this extra structure also helps the attacker.<p>An example of this phenomena is the McEliece code-based cryptosystem. Many variants based on alternative codes, attempting to reduce the public key size, have been proposed over the years, and very few have survived. Another example is elliptic curves: early on speed was an issue for their practicality, so many weak curves were also proposed that tried to speed things up (one particular example was Koblitz&#x27;s supersingular curve that rendered point doubling into a linear operation).<p>Ideal lattices have exacerbated this phenomena by its applications. Lattices are a key tool in fully homomorphic encryption and friends (multilinear maps, now also obfuscation), and in the frenzy to get these applications into practicality ideal lattices (as opposed to unstructured ones) seem to be the fastest shortcut into better speed and size. It remains to be seen whether they&#x27;ll survive.
评论 #7237866 未加载
yoha超过 11 年前
Bernstein&#x27;s paper are very interesting and contain strong material. He uses an excellent theoretical background but keeps practical considerations in sight. The cryptographic constructions he published are very efficient (e.g. RFSB [1] is way faster than all other code-based hash functions). I should also add that this blog entry is a good illustration of how clear his explanations can be.<p>[1] see [rfsb] in <a href="http://cr.yp.to/codes.html#rfsb" rel="nofollow">http:&#x2F;&#x2F;cr.yp.to&#x2F;codes.html#rfsb</a>
diziet超过 11 年前
For more background on ideal lattice based encryption see <a href="https://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~odonnell&#x2F;hits09&#x2F;gentry-homomorphic-e...</a> (pdf).
评论 #7237177 未加载