cryptography, information security, and...

109
Cryptography, Information Security, and Mathematics: Recent Advances Koji NUIDA(AIST) / JST さきがけ(JST PRESTOセキュリティにおける 2016 12 19 大学 (c) Koji Nuida December 19, 2016 CRISMATH 1/41

Upload: others

Post on 31-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Cryptography, Information Security, andMathematics: Recent Advances

縫田 光司(Koji NUIDA)

産業技術総合研究所 (AIST)/ JSTさきがけ(JST PRESTO)

情報セキュリティにおける数学的方法とその実践2016年 12月 19日 @北海道大学

(c) Koji Nuida December 19, 2016 CRISMATH 1/41

Page 2: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

For SCIS People

The (extended) deadline for paper submissionhas passed (almost now, at 10:00)

Please take a rest before the next talk :-)

(c) Koji Nuida December 19, 2016 CRISMATH 2/41

Page 3: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Few Years Ago (Maybe)

(Rough) scenario of a police TV drama:

Victim was a mathematician, he found“ultimate property of primes”He decided to delete his result, because itwill cause “fatal catastrophe” aboutcryptography in the whole world(and was killed by his friend who disagreed)

The “catastrophe” is fictional, but this exampleshows: It has become recognized so widely thatprimes and cryptography are related (in someunknown way)

(c) Koji Nuida December 19, 2016 CRISMATH 3/41

Page 4: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Few Years Ago (Maybe)

(Rough) scenario of a police TV drama:

Victim was a mathematician, he found“ultimate property of primes”He decided to delete his result, because itwill cause “fatal catastrophe” aboutcryptography in the whole world(and was killed by his friend who disagreed)

The “catastrophe” is fictional, but this exampleshows: It has become recognized so widely thatprimes and cryptography are related (in someunknown way)

(c) Koji Nuida December 19, 2016 CRISMATH 3/41

Page 5: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Main Theme of This Talk

The RSA cryptosystem would have maderelation of math. and crypto. so popular, but ...

RSA is NOT the only such relation

(and “RSA and elliptic curve crypto.” arenot the only, too)

(c) Koji Nuida December 19, 2016 CRISMATH 4/41

Page 6: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Relation between Mathematics and Cryptography

(c) Koji Nuida December 19, 2016 CRISMATH 5/41

Page 7: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

CRISMATH Workshop

暗号及び情報セキュリティと数学の相関ワークショップ (workshop on interaction betweenCRyptography, Information Security andMATHematics)

Invited talks on math. & crypto. (and more)

This year’s: Dec. 26th @Tokyo (Odaiba)

Organizers: K. Nuida, T. Abe, S. Kaji,H. Kurihara, T. Maeno, Y. Numata

(Underlined: Speakers of the currentworkshop)

(c) Koji Nuida December 19, 2016 CRISMATH 6/41

Page 8: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

CRISMATH Workshop: Some Math. Topics in the Past

linear-algebraic technique in integer factorization;dynamical systems and sensor networks (Z. Arai);algorithmic randomness and quantum keydistribution; network codings and sheaf cohomology;algorithmic randomness and random oracles;algebraic-geometrical approach on LLL algorithm;NP vs. P problem; algebraic surfaces andcryptography (K. Akiyama); cryptography fromgroup theory (N.); group rings and NTRUcryptosystem; quantum computation; isogenies forelliptic curves (K. Takashima); Bernoulli numbersand use of FHE (N.)

(c) Koji Nuida December 19, 2016 CRISMATH 7/41

Page 9: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

CRISMATH Workshop: This Year’s Talks

川合 豊「鍵が固定された場合の暗号方式の安全性について」品川 和雅「カードとシャッフルから見るカード暗号プロトコル」白勢 政明「楕円曲線,暗号,素因数分解」

On applications of elliptic curves to integerfactorization

Taechan Kim「Extended Tower Number FieldSieve」

On speed-up for discrete logarithms

縫田 光司「秘密計算で他者に迷惑をかけずに疑似乱数を使えるか」

(c) Koji Nuida December 19, 2016 CRISMATH 8/41

Page 10: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Public Key Encryption (PKE)

To conceal messages from attackers

Encryption: message 7→ ciphertext

using public encryption key pk

Decryption: ciphertext 7→ message

using secret decryption key sk

Decsk(Encpk(m)) = m

pk should not yield information on sk

(c) Koji Nuida December 19, 2016 CRISMATH 9/41

Page 11: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Public Key Encryption (PKE)

To conceal messages from attackers

Encryption: message 7→ ciphertext

using public encryption key pk

Decryption: ciphertext 7→ message

using secret decryption key sk

Decsk(Encpk(m)) = m

pk should not yield information on sk

(c) Koji Nuida December 19, 2016 CRISMATH 9/41

Page 12: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Public Key Encryption (PKE)

To conceal messages from attackers

Encryption: message 7→ ciphertext

using public encryption key pk

Decryption: ciphertext 7→ message

using secret decryption key sk

Decsk(Encpk(m)) = m

pk should not yield information on sk

(c) Koji Nuida December 19, 2016 CRISMATH 9/41

Page 13: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Public Key Encryption (PKE)

To conceal messages from attackers

Encryption: message 7→ ciphertext

using public encryption key pk

Decryption: ciphertext 7→ message

using secret decryption key sk

Decsk(Encpk(m)) = m

pk should not yield information on sk

(c) Koji Nuida December 19, 2016 CRISMATH 9/41

Page 14: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Public Key Encryption (PKE)

To conceal messages from attackers

Encryption: message 7→ ciphertext

using public encryption key pk

Decryption: ciphertext 7→ message

using secret decryption key sk

Decsk(Encpk(m)) = m

pk should not yield information on sk

(c) Koji Nuida December 19, 2016 CRISMATH 9/41

Page 15: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Before the RSA: “One-Time Pad”

Symmetric key encryption, where pk = skshould be hidden

Given “message” m ∈ M (finite additive group)

Originally, M = (F2)n (bitwise XOR)

If pk = k ∈ M is uniformly random, thenciphertext c = Enck(m) := m + k isindependent of m

Perfectly hiding, if k is used only once

(c) Koji Nuida December 19, 2016 CRISMATH 10/41

Page 16: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Before the RSA: “One-Time Pad”

Symmetric key encryption, where pk = skshould be hidden

Given “message” m ∈ M (finite additive group)

Originally, M = (F2)n (bitwise XOR)

If pk = k ∈ M is uniformly random, thenciphertext c = Enck(m) := m + k isindependent of m

Perfectly hiding, if k is used only once

(c) Koji Nuida December 19, 2016 CRISMATH 10/41

Page 17: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Before the RSA: “One-Time Pad”

Symmetric key encryption, where pk = skshould be hidden

Given “message” m ∈ M (finite additive group)

Originally, M = (F2)n (bitwise XOR)

If pk = k ∈ M is uniformly random, thenciphertext c = Enck(m) := m + k isindependent of m

Perfectly hiding, if k is used only once

(c) Koji Nuida December 19, 2016 CRISMATH 10/41

Page 18: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Before the RSA: “One-Time Pad”

Symmetric key encryption, where pk = skshould be hidden

Given “message” m ∈ M (finite additive group)

Originally, M = (F2)n (bitwise XOR)

If pk = k ∈ M is uniformly random, thenciphertext c = Enck(m) := m + k isindependent of m

Perfectly hiding, if k is used only once

(c) Koji Nuida December 19, 2016 CRISMATH 10/41

Page 19: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

The RSA Cryptosystem [1977 ?]

N = pq (distinct primes)

e, d with ed ≡ 1 (mod (p − 1)(q − 1))

Given message m ∈ (Z/NZ)×,Enc(m) := me (public key: (N , e))

Dec(c) := cd (secret key: d)

d would be computable if p, q were known

Drawback: Enc is deterministic (“textbook RSA”)

Improved variant is practically used

(c) Koji Nuida December 19, 2016 CRISMATH 11/41

Page 20: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

The RSA Cryptosystem [1977 ?]

N = pq (distinct primes)

e, d with ed ≡ 1 (mod (p − 1)(q − 1))

Given message m ∈ (Z/NZ)×,Enc(m) := me (public key: (N , e))

Dec(c) := cd (secret key: d)

d would be computable if p, q were known

Drawback: Enc is deterministic (“textbook RSA”)

Improved variant is practically used

(c) Koji Nuida December 19, 2016 CRISMATH 11/41

Page 21: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

The RSA Cryptosystem [1977 ?]

N = pq (distinct primes)

e, d with ed ≡ 1 (mod (p − 1)(q − 1))

Given message m ∈ (Z/NZ)×,Enc(m) := me (public key: (N , e))

Dec(c) := cd (secret key: d)

d would be computable if p, q were known

Drawback: Enc is deterministic (“textbook RSA”)

Improved variant is practically used

(c) Koji Nuida December 19, 2016 CRISMATH 11/41

Page 22: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Computational Assumptions

In PKE, secret should not be found in “practical”(theoretically, probabilistic polynomial) time

E.g. “Factoring N is hard” for the RSA

Theoretically, just “assumption” (cf. P vs NP)

Practically, evaluated by experimentsConsensus: “(General) Number Field Sieve”would factorize N ≈ 21024 in near future

(c) Koji Nuida December 19, 2016 CRISMATH 12/41

Page 23: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Computational Assumptions

In PKE, secret should not be found in “practical”(theoretically, probabilistic polynomial) time

E.g. “Factoring N is hard” for the RSA

Theoretically, just “assumption” (cf. P vs NP)

Practically, evaluated by experimentsConsensus: “(General) Number Field Sieve”would factorize N ≈ 21024 in near future

(c) Koji Nuida December 19, 2016 CRISMATH 12/41

Page 24: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

The Number Field Sieve [Pollard+1990 ?]

State-of-the-art method to factoring integers(=⇒ to break the RSA cryptosystem)

Using number fields

Complexity: sub-exponential (not polynomial)

Current status: Recommended to finish usingRSA with N ≈ 21024 (1024-bit key)

(c) Koji Nuida December 19, 2016 CRISMATH 13/41

Page 25: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Special) Number Field Sieve (1/3)

Choose

f (t) ∈ Z[t], irreducible over Qα ∈ C, with f (α) = 0

m ∈ Z, with f (m) ≡ 0 (mod N), 0 < m ≪ N

and assume the followings: (avoidable, in general)

K = Q(α) has integer ring OK = Z[α]OK is UFD

(c) Koji Nuida December 19, 2016 CRISMATH 14/41

Page 26: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Special) Number Field Sieve (2/3)

f (α) = 0, f (m) ≡ 0 (mod N), m ≪ N

Define φ : Z[α] hom.−→ Z/NZ, φ(α) = m

For a, b ∈ Z, compute φ(a + bα) in two ways:

φ(factorization of a + bα in Z[α])factorization of φ(a + bα) in Z (⇒ in Z/NZ)

Then get: (∏

of primes) ≡ (∏

of primes) in Z/NZ

(c) Koji Nuida December 19, 2016 CRISMATH 15/41

Page 27: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Special) Number Field Sieve (2/3)

f (α) = 0, f (m) ≡ 0 (mod N), m ≪ N

Define φ : Z[α] hom.−→ Z/NZ, φ(α) = m

For a, b ∈ Z, compute φ(a + bα) in two ways:

φ(factorization of a + bα in Z[α])factorization of φ(a + bα) in Z (⇒ in Z/NZ)

Then get: (∏

of primes) ≡ (∏

of primes) in Z/NZ

(c) Koji Nuida December 19, 2016 CRISMATH 15/41

Page 28: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Special) Number Field Sieve (3/3)

Relations (∏

of primes) ≡ (∏

of primes) in Z/NZfor each a, b ∈ Z

Combine them (by observing exponents) to get

x2 ≡ y 2 (mod N)

yielding (with high probability)

1 < gcd(x+y ,N) < N or 1 < gcd(x−y ,N) < N

(c) Koji Nuida December 19, 2016 CRISMATH 16/41

Page 29: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Special) Number Field Sieve (3/3)

Relations (∏

of primes) ≡ (∏

of primes) in Z/NZfor each a, b ∈ ZCombine them (by observing exponents) to get

x2 ≡ y 2 (mod N)

yielding (with high probability)

1 < gcd(x+y ,N) < N or 1 < gcd(x−y ,N) < N

(c) Koji Nuida December 19, 2016 CRISMATH 16/41

Page 30: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 31: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 32: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 33: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 34: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 35: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Prior to RSA — Diffie–Hellman Key Exchange [1976]

Protocol between parties P1 and P2

Choose G = ⟨g⟩ (finite cyclic) in public, then

1 Pi sends hi := g ai , while hiding ai ∈ Z2 Given h3−i , Pi computes Ki := h3−i

ai

Getting a common (random) secret element

K1 = (g a2)a1 = g a2a1 = g a1a2 = (g a1)a2 = K2

with no pre-shared secret

Can be converted to PKE [ElGamal 1985]

(c) Koji Nuida December 19, 2016 CRISMATH 17/41

Page 36: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Is DH Key Exchange Secure?

Public: G = ⟨g⟩ and hi ∈ GSecret: ai with hi = g ai

⇒ The discrete logarithm problem (DL) in Gmust be computationally hard:

(DL) Given g , h, find x with h = g x in G

Remark: (In)sufficiency is still open

(c) Koji Nuida December 19, 2016 CRISMATH 18/41

Page 37: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Is DH Key Exchange Secure?

Public: G = ⟨g⟩ and hi ∈ GSecret: ai with hi = g ai

⇒ The discrete logarithm problem (DL) in Gmust be computationally hard:

(DL) Given g , h, find x with h = g x in G

Remark: (In)sufficiency is still open

(c) Koji Nuida December 19, 2016 CRISMATH 18/41

Page 38: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 39: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 40: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 41: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 42: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 43: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 44: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (1/2)

Q1. x · 7 = 15 in Z/16Z? ... x = 9

Q2. 10x = 6 in F×17? ... x = 5

Q2 looks more difficult than Q1,though Z/16Z ≃ F×

17 as groups

⇒ Difficulty of DL does depend ona “realization” of the same abstract group G !

(c) Koji Nuida December 19, 2016 CRISMATH 19/41

Page 45: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (2/2)

Efficient solution for Q1:use (Extended) Euclidean Algorithm

which uses integer division (or ordering)

for the DL in additive group Z/nZ!A lesson: Additional structure for group G makesthe DL easier (⇒ break of DH Key Exchange)

Cf. [Maurer 2005] DL is hard in “generic group”

“Oracle access to multiplication table only”

(c) Koji Nuida December 19, 2016 CRISMATH 20/41

Page 46: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (2/2)

Efficient solution for Q1:use (Extended) Euclidean Algorithm

which uses integer division (or ordering)

for the DL in additive group Z/nZ!A lesson: Additional structure for group G makesthe DL easier (⇒ break of DH Key Exchange)

Cf. [Maurer 2005] DL is hard in “generic group”

“Oracle access to multiplication table only”

(c) Koji Nuida December 19, 2016 CRISMATH 20/41

Page 47: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (2/2)

Efficient solution for Q1:use (Extended) Euclidean Algorithm

which uses integer division (or ordering)

for the DL in additive group Z/nZ!

A lesson: Additional structure for group G makesthe DL easier (⇒ break of DH Key Exchange)

Cf. [Maurer 2005] DL is hard in “generic group”

“Oracle access to multiplication table only”

(c) Koji Nuida December 19, 2016 CRISMATH 20/41

Page 48: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Choice of the Group for Security (2/2)

Efficient solution for Q1:use (Extended) Euclidean Algorithm

which uses integer division (or ordering)

for the DL in additive group Z/nZ!A lesson: Additional structure for group G makesthe DL easier (⇒ break of DH Key Exchange)

Cf. [Maurer 2005] DL is hard in “generic group”

“Oracle access to multiplication table only”

(c) Koji Nuida December 19, 2016 CRISMATH 20/41

Page 49: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A New Viewpoint from Cryptography

(Mathematician: more structures, more happiness)

(c) Koji Nuida December 19, 2016 CRISMATH 21/41

Page 50: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

State-of-the-Art Candidate from Elliptic Curves

(Subgroups of) groups of rational points onelliptic curves (over finite fields)

Additive group structure

Other structures are not known well(in comparison to Z/nZ and Fq

×)

Current status: |G | ⪆ 2160

Cf. N ⪆ 21024 for the RSA

(c) Koji Nuida December 19, 2016 CRISMATH 22/41

Page 51: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

State-of-the-Art Candidate from Elliptic Curves

(Subgroups of) groups of rational points onelliptic curves (over finite fields)

Additive group structure

Other structures are not known well(in comparison to Z/nZ and Fq

×)

Current status: |G | ⪆ 2160

Cf. N ⪆ 21024 for the RSA

(c) Koji Nuida December 19, 2016 CRISMATH 22/41

Page 52: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

State-of-the-Art Candidate from Elliptic Curves

(Subgroups of) groups of rational points onelliptic curves (over finite fields)

Additive group structure

Other structures are not known well(in comparison to Z/nZ and Fq

×)

Current status: |G | ⪆ 2160

Cf. N ⪆ 21024 for the RSA

(c) Koji Nuida December 19, 2016 CRISMATH 22/41

Page 53: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

State-of-the-Art Candidate from Elliptic Curves

(Subgroups of) groups of rational points onelliptic curves (over finite fields)

Additive group structure

Other structures are not known well(in comparison to Z/nZ and Fq

×)

Current status: |G | ⪆ 2160

Cf. N ⪆ 21024 for the RSA

(c) Koji Nuida December 19, 2016 CRISMATH 22/41

Page 54: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Shor’s Quantum Algorithms

Quantum computer: framework of fast computationusing superimposed quantum states

Not practically implemented so far

[Shor 1994]: Quantum algorithms, implying

integer factoring in polynomial time!

discrete logarithm in polynomial time!

(Cf. [Grover 1996]: Search with quadratic speedup)

(c) Koji Nuida December 19, 2016 CRISMATH 23/41

Page 55: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Shor’s Quantum Algorithms

Quantum computer: framework of fast computationusing superimposed quantum states

Not practically implemented so far

[Shor 1994]: Quantum algorithms, implying

integer factoring in polynomial time!

discrete logarithm in polynomial time!

(Cf. [Grover 1996]: Search with quadratic speedup)

(c) Koji Nuida December 19, 2016 CRISMATH 23/41

Page 56: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Shor’s Quantum Algorithms

Quantum computer: framework of fast computationusing superimposed quantum states

Not practically implemented so far

[Shor 1994]: Quantum algorithms, implying

integer factoring in polynomial time!

discrete logarithm in polynomial time!

(Cf. [Grover 1996]: Search with quadratic speedup)

(c) Koji Nuida December 19, 2016 CRISMATH 23/41

Page 57: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Pinpoint Effect by Shor to Cryptography

Shor’s main applications: integer factoring and DL

Main tools of PKE: integer factoring and DL

Oh, My God!

−→ Importance of “quantum-resistant” PKE

(Believed to be) unbroken by quantum computer

Related to the talks by K. Akiyama andK. Takashima

(c) Koji Nuida December 19, 2016 CRISMATH 24/41

Page 58: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Pinpoint Effect by Shor to Cryptography

Shor’s main applications: integer factoring and DL

Main tools of PKE: integer factoring and DL

Oh, My God!

−→ Importance of “quantum-resistant” PKE

(Believed to be) unbroken by quantum computer

Related to the talks by K. Akiyama andK. Takashima

(c) Koji Nuida December 19, 2016 CRISMATH 24/41

Page 59: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Pinpoint Effect by Shor to Cryptography

Shor’s main applications: integer factoring and DL

Main tools of PKE: integer factoring and DL

Oh, My God!

−→ Importance of “quantum-resistant” PKE

(Believed to be) unbroken by quantum computer

Related to the talks by K. Akiyama andK. Takashima

(c) Koji Nuida December 19, 2016 CRISMATH 24/41

Page 60: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Major Strategy for PKE

(c) Koji Nuida December 19, 2016 CRISMATH 25/41

Page 61: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Multi-Party Computation (MPC): Two-Party Case

Given function f (x , y) (e.g., f (x , y) = δx ,y),

Party P1 has secret input a1

Party P2 has secret input a2

They want to know f (a1, a2) by communication

while hiding information on each input!

(except those trivially implied from f (a1, a2))

(c) Koji Nuida December 19, 2016 CRISMATH 26/41

Page 62: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Multi-Party Computation (MPC): Two-Party Case

Given function f (x , y) (e.g., f (x , y) = δx ,y),

Party P1 has secret input a1

Party P2 has secret input a2

They want to know f (a1, a2) by communication

while hiding information on each input!

(except those trivially implied from f (a1, a2))

(c) Koji Nuida December 19, 2016 CRISMATH 26/41

Page 63: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Tool for MPC: Homomorphic Encryption (HE)

Example: additively-HE

Message set M is additive group

A “practical” operation ⊞ for ciphertexts with

Dec(c1 ⊞ c2) = Dec(c1) + Dec(c2) ∈ M

(called “homomorphic operation”)

“Messages can be added in encrypted form”

Related to the talks by K. Shimizu, H. Arimura(and K. Akiyama)

(c) Koji Nuida December 19, 2016 CRISMATH 27/41

Page 64: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Tool for MPC: Homomorphic Encryption (HE)

Example: additively-HE

Message set M is additive group

A “practical” operation ⊞ for ciphertexts with

Dec(c1 ⊞ c2) = Dec(c1) + Dec(c2) ∈ M

(called “homomorphic operation”)

“Messages can be added in encrypted form”

Related to the talks by K. Shimizu, H. Arimura(and K. Akiyama)

(c) Koji Nuida December 19, 2016 CRISMATH 27/41

Page 65: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Tool for MPC: Homomorphic Encryption (HE)

Example: additively-HE

Message set M is additive group

A “practical” operation ⊞ for ciphertexts with

Dec(c1 ⊞ c2) = Dec(c1) + Dec(c2) ∈ M

(called “homomorphic operation”)

“Messages can be added in encrypted form”

Related to the talks by K. Shimizu, H. Arimura(and K. Akiyama)

(c) Koji Nuida December 19, 2016 CRISMATH 27/41

Page 66: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Tool for MPC: Homomorphic Encryption (HE)

Example: additively-HE

Message set M is additive group

A “practical” operation ⊞ for ciphertexts with

Dec(c1 ⊞ c2) = Dec(c1) + Dec(c2) ∈ M

(called “homomorphic operation”)

“Messages can be added in encrypted form”

Related to the talks by K. Shimizu, H. Arimura(and K. Akiyama)

(c) Koji Nuida December 19, 2016 CRISMATH 27/41

Page 67: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A Tool for MPC: Homomorphic Encryption (HE)

Example: additively-HE

Message set M is additive group

A “practical” operation ⊞ for ciphertexts with

Dec(c1 ⊞ c2) = Dec(c1) + Dec(c2) ∈ M

(called “homomorphic operation”)

“Messages can be added in encrypted form”

Related to the talks by K. Shimizu, H. Arimura(and K. Akiyama)

(c) Koji Nuida December 19, 2016 CRISMATH 27/41

Page 68: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

A “Rough Idea” for HE

(c) Koji Nuida December 19, 2016 CRISMATH 28/41

Page 69: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of (Multiplicative) HE [ElGamal 1985]

Public key: G = ⟨g⟩ (prime order), h ∈ GSecret key: s ∈ Z with h = g s

Given m ∈ G , Enc(m) := (g r , hrm) ∈ G 2

where r ∈ Z is random

Given c = (c1, c2), Dec(c) := c1−sc2

“Project to (g 0, gZ) in direction (g 1, g−s)”

Homomorphic operation: multiplication in G 2

(c) Koji Nuida December 19, 2016 CRISMATH 29/41

Page 70: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of (Multiplicative) HE [ElGamal 1985]

Public key: G = ⟨g⟩ (prime order), h ∈ GSecret key: s ∈ Z with h = g s

Given m ∈ G , Enc(m) := (g r , hrm) ∈ G 2

where r ∈ Z is random

Given c = (c1, c2), Dec(c) := c1−sc2

“Project to (g 0, gZ) in direction (g 1, g−s)”

Homomorphic operation: multiplication in G 2

(c) Koji Nuida December 19, 2016 CRISMATH 29/41

Page 71: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of (Multiplicative) HE [ElGamal 1985]

Public key: G = ⟨g⟩ (prime order), h ∈ GSecret key: s ∈ Z with h = g s

Given m ∈ G , Enc(m) := (g r , hrm) ∈ G 2

where r ∈ Z is random

Given c = (c1, c2), Dec(c) := c1−sc2

“Project to (g 0, gZ) in direction (g 1, g−s)”

Homomorphic operation: multiplication in G 2

(c) Koji Nuida December 19, 2016 CRISMATH 29/41

Page 72: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of (Multiplicative) HE [ElGamal 1985]

Public key: G = ⟨g⟩ (prime order), h ∈ GSecret key: s ∈ Z with h = g s

Given m ∈ G , Enc(m) := (g r , hrm) ∈ G 2

where r ∈ Z is random

Given c = (c1, c2), Dec(c) := c1−sc2

“Project to (g 0, gZ) in direction (g 1, g−s)”

Homomorphic operation: multiplication in G 2

(c) Koji Nuida December 19, 2016 CRISMATH 29/41

Page 73: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of (Multiplicative) HE [ElGamal 1985]

Public key: G = ⟨g⟩ (prime order), h ∈ GSecret key: s ∈ Z with h = g s

Given m ∈ G , Enc(m) := (g r , hrm) ∈ G 2

where r ∈ Z is random

Given c = (c1, c2), Dec(c) := c1−sc2

“Project to (g 0, gZ) in direction (g 1, g−s)”

Homomorphic operation: multiplication in G 2

(c) Koji Nuida December 19, 2016 CRISMATH 29/41

Page 74: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 75: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 76: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 77: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 78: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 79: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 80: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Example of MPC from HE

How to compute δa1,a2 (Notation: [[a]] := Enc(a))

Suppose: additively-HE with M = Fp

1 P1 chooses key, sends public key only

2 P1 generates and sends [[a1]]

3 P2 computes [[a1]]⊞ [[−a2]] = [[a1 − a2]]

4 P2 computes [[r(a1 − a2)]] for random r = 0

by random iteration of ⊞ to [[a1 − a2]]

5 P1 decrypts [[r(a1 − a2)]] ⇝ 0 iff a1 = a2

Applications to bioinformatics: Talk by K. Shimizu

(c) Koji Nuida December 19, 2016 CRISMATH 30/41

Page 81: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Fully Homomorphic Encryption [2009]

(Additively-)HE: “addition in encrypted form”

Fully homomorphic encryption (FHE):

Any computation in encrypted form

⇔ Ring-HE, when M = Fp (p prime)

→ Use of FHE is related to polynomialexpressions of functions (talk by T. Maeno)

(c) Koji Nuida December 19, 2016 CRISMATH 31/41

Page 82: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Fully Homomorphic Encryption [2009]

(Additively-)HE: “addition in encrypted form”

Fully homomorphic encryption (FHE):

Any computation in encrypted form

⇔ Ring-HE, when M = Fp (p prime)

→ Use of FHE is related to polynomialexpressions of functions (talk by T. Maeno)

(c) Koji Nuida December 19, 2016 CRISMATH 31/41

Page 83: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Fully Homomorphic Encryption [2009]

(Additively-)HE: “addition in encrypted form”

Fully homomorphic encryption (FHE):

Any computation in encrypted form

⇔ Ring-HE, when M = Fp (p prime)

→ Use of FHE is related to polynomialexpressions of functions (talk by T. Maeno)

(c) Koji Nuida December 19, 2016 CRISMATH 31/41

Page 84: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Too) Simplified Example [2010] [N. et al. 2015]

Z/ℓZ identified with {0, . . . , ℓ− 1} by “mod”

Choose p′ ≫ p primes, p′ |N

Enc(m) = r ′p′ + rp +m mod N for m ∈ Fp

Dec(c) = (c mod p′) mod p

Decryption works iff r is “not too large”

Ring-homomorphic operations: as usual in Z/NZbut iteration of operations is limited! (r grows)

“Bootstrapping”: refreshing the ciphertext

possible, but very inefficient

(c) Koji Nuida December 19, 2016 CRISMATH 32/41

Page 85: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Too) Simplified Example [2010] [N. et al. 2015]

Z/ℓZ identified with {0, . . . , ℓ− 1} by “mod”

Choose p′ ≫ p primes, p′ |NEnc(m) = r ′p′ + rp +m mod N for m ∈ Fp

Dec(c) = (c mod p′) mod p

Decryption works iff r is “not too large”

Ring-homomorphic operations: as usual in Z/NZbut iteration of operations is limited! (r grows)

“Bootstrapping”: refreshing the ciphertext

possible, but very inefficient

(c) Koji Nuida December 19, 2016 CRISMATH 32/41

Page 86: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Too) Simplified Example [2010] [N. et al. 2015]

Z/ℓZ identified with {0, . . . , ℓ− 1} by “mod”

Choose p′ ≫ p primes, p′ |NEnc(m) = r ′p′ + rp +m mod N for m ∈ Fp

Dec(c) = (c mod p′) mod p

Decryption works iff r is “not too large”

Ring-homomorphic operations: as usual in Z/NZbut iteration of operations is limited! (r grows)

“Bootstrapping”: refreshing the ciphertext

possible, but very inefficient

(c) Koji Nuida December 19, 2016 CRISMATH 32/41

Page 87: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Too) Simplified Example [2010] [N. et al. 2015]

Z/ℓZ identified with {0, . . . , ℓ− 1} by “mod”

Choose p′ ≫ p primes, p′ |NEnc(m) = r ′p′ + rp +m mod N for m ∈ Fp

Dec(c) = (c mod p′) mod p

Decryption works iff r is “not too large”

Ring-homomorphic operations: as usual in Z/NZbut iteration of operations is limited! (r grows)

“Bootstrapping”: refreshing the ciphertext

possible, but very inefficient

(c) Koji Nuida December 19, 2016 CRISMATH 32/41

Page 88: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

(Too) Simplified Example [2010] [N. et al. 2015]

Z/ℓZ identified with {0, . . . , ℓ− 1} by “mod”

Choose p′ ≫ p primes, p′ |NEnc(m) = r ′p′ + rp +m mod N for m ∈ Fp

Dec(c) = (c mod p′) mod p

Decryption works iff r is “not too large”

Ring-homomorphic operations: as usual in Z/NZbut iteration of operations is limited! (r grows)

“Bootstrapping”: refreshing the ciphertext

possible, but very inefficient

(c) Koji Nuida December 19, 2016 CRISMATH 32/41

Page 89: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards “Unlimited” Ring-HE

A (hopefully) possible strategy:

1 “Embed” Fp into a (non-commutative) group G

Operations of Fp realized by operations of G

2 Take a lift of G (e.g., G × H for suitable H)

3 “Homomorphically hide” the structure of the lift

⇝ hard-to-compute group hom. φ : G ↠ G

must be easy-to-compute with secret key

Public: G and generators of kerφ (for Enc)

(c) Koji Nuida December 19, 2016 CRISMATH 33/41

Page 90: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards “Unlimited” Ring-HE

A (hopefully) possible strategy:

1 “Embed” Fp into a (non-commutative) group G

Operations of Fp realized by operations of G

2 Take a lift of G (e.g., G × H for suitable H)

3 “Homomorphically hide” the structure of the lift

⇝ hard-to-compute group hom. φ : G ↠ G

must be easy-to-compute with secret key

Public: G and generators of kerφ (for Enc)

(c) Koji Nuida December 19, 2016 CRISMATH 33/41

Page 91: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards “Unlimited” Ring-HE

A (hopefully) possible strategy:

1 “Embed” Fp into a (non-commutative) group G

Operations of Fp realized by operations of G

2 Take a lift of G (e.g., G × H for suitable H)

3 “Homomorphically hide” the structure of the lift

⇝ hard-to-compute group hom. φ : G ↠ G

must be easy-to-compute with secret key

Public: G and generators of kerφ (for Enc)

(c) Koji Nuida December 19, 2016 CRISMATH 33/41

Page 92: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards “Unlimited” Ring-HE

A (hopefully) possible strategy:

1 “Embed” Fp into a (non-commutative) group G

Operations of Fp realized by operations of G

2 Take a lift of G (e.g., G × H for suitable H)

3 “Homomorphically hide” the structure of the lift

⇝ hard-to-compute group hom. φ : G ↠ G

must be easy-to-compute with secret key

Public: G and generators of kerφ (for Enc)

(c) Koji Nuida December 19, 2016 CRISMATH 33/41

Page 93: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards “Unlimited” Ring-HE

A (hopefully) possible strategy:

1 “Embed” Fp into a (non-commutative) group G

Operations of Fp realized by operations of G

2 Take a lift of G (e.g., G × H for suitable H)

3 “Homomorphically hide” the structure of the lift

⇝ hard-to-compute group hom. φ : G ↠ G

must be easy-to-compute with secret key

Public: G and generators of kerφ (for Enc)

(c) Koji Nuida December 19, 2016 CRISMATH 33/41

Page 94: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

How to Realize NAND Gate in Simple Groups

NAND(b1, b2) = 0 iff b1 = b2 = 1

[Ostrovsky–Skeith 2008] For any non-commutativefinite simple group G , there exist g0 = g1 ∈ G andF : G 2 → G with:

F (g1, g1) = g0

F (g0, g0) = F (g0, g1) = F (g1, g0) = g1

F is composed of group operations in G

Proof (sketch):

⟨{[∗, σ1]}⟩ is normal, hence = G

⇒ ∃(compositions of [∗, σ1]±1) = σ1

When σ1 7→ σ0, LHS becomes 1 = σ0

(c) Koji Nuida December 19, 2016 CRISMATH 34/41

Page 95: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

How to Realize NAND Gate in Simple Groups

NAND(b1, b2) = 0 iff b1 = b2 = 1[Ostrovsky–Skeith 2008] For any non-commutativefinite simple group G , there exist g0 = g1 ∈ G andF : G 2 → G with:

F (g1, g1) = g0

F (g0, g0) = F (g0, g1) = F (g1, g0) = g1

F is composed of group operations in G

Proof (sketch):

⟨{[∗, σ1]}⟩ is normal, hence = G

⇒ ∃(compositions of [∗, σ1]±1) = σ1

When σ1 7→ σ0, LHS becomes 1 = σ0

(c) Koji Nuida December 19, 2016 CRISMATH 34/41

Page 96: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

How to Realize NAND Gate in Simple Groups

NAND(b1, b2) = 0 iff b1 = b2 = 1[Ostrovsky–Skeith 2008] For any non-commutativefinite simple group G , there exist g0 = g1 ∈ G andF : G 2 → G with:

F (g1, g1) = g0

F (g0, g0) = F (g0, g1) = F (g1, g0) = g1

F is composed of group operations in G

Proof (sketch):

⟨{[∗, σ1]}⟩ is normal, hence = G

⇒ ∃(compositions of [∗, σ1]±1) = σ1

When σ1 7→ σ0, LHS becomes 1 = σ0

(c) Koji Nuida December 19, 2016 CRISMATH 34/41

Page 97: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

How to Realize NAND Gate in Simple Groups

NAND(b1, b2) = 0 iff b1 = b2 = 1[Ostrovsky–Skeith 2008] For any non-commutativefinite simple group G , there exist g0 = g1 ∈ G andF : G 2 → G with:

F (g1, g1) = g0

F (g0, g0) = F (g0, g1) = F (g1, g0) = g1

F is composed of group operations in G

Proof (sketch):

⟨{[∗, σ1]}⟩ is normal, hence = G

⇒ ∃(compositions of [∗, σ1]±1) = σ1

When σ1 7→ σ0, LHS becomes 1 = σ0

(c) Koji Nuida December 19, 2016 CRISMATH 34/41

Page 98: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

How to Realize NAND Gate in Simple Groups

NAND(b1, b2) = 0 iff b1 = b2 = 1[Ostrovsky–Skeith 2008] For any non-commutativefinite simple group G , there exist g0 = g1 ∈ G andF : G 2 → G with:

F (g1, g1) = g0

F (g0, g0) = F (g0, g1) = F (g1, g0) = g1

F is composed of group operations in G

Proof (sketch):

⟨{[∗, σ1]}⟩ is normal, hence = G

⇒ ∃(compositions of [∗, σ1]±1) = σ1

When σ1 7→ σ0, LHS becomes 1 = σ0

(c) Koji Nuida December 19, 2016 CRISMATH 34/41

Page 99: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards Homomorphically Hiding the Group

My recent (very rough) idea:

1 Presentation of G × H by generators/relations

2 “Shuffle” presentation by randomly applyingTietze transformations

3 Apply Knuth-Bendix completion algorithm, toyield normal form of each group element

Otherwise, Enc is also hard-to-compute

Current problems:

Knuth-Bendix algorithm may not terminate

Is it really secure?

(c) Koji Nuida December 19, 2016 CRISMATH 35/41

Page 100: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards Homomorphically Hiding the Group

My recent (very rough) idea:

1 Presentation of G × H by generators/relations

2 “Shuffle” presentation by randomly applyingTietze transformations

3 Apply Knuth-Bendix completion algorithm, toyield normal form of each group element

Otherwise, Enc is also hard-to-compute

Current problems:

Knuth-Bendix algorithm may not terminate

Is it really secure?

(c) Koji Nuida December 19, 2016 CRISMATH 35/41

Page 101: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards Homomorphically Hiding the Group

My recent (very rough) idea:

1 Presentation of G × H by generators/relations

2 “Shuffle” presentation by randomly applyingTietze transformations

3 Apply Knuth-Bendix completion algorithm, toyield normal form of each group element

Otherwise, Enc is also hard-to-compute

Current problems:

Knuth-Bendix algorithm may not terminate

Is it really secure?

(c) Koji Nuida December 19, 2016 CRISMATH 35/41

Page 102: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards Homomorphically Hiding the Group

My recent (very rough) idea:

1 Presentation of G × H by generators/relations

2 “Shuffle” presentation by randomly applyingTietze transformations

3 Apply Knuth-Bendix completion algorithm, toyield normal form of each group element

Otherwise, Enc is also hard-to-compute

Current problems:

Knuth-Bendix algorithm may not terminate

Is it really secure?

(c) Koji Nuida December 19, 2016 CRISMATH 35/41

Page 103: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Towards Homomorphically Hiding the Group

My recent (very rough) idea:

1 Presentation of G × H by generators/relations

2 “Shuffle” presentation by randomly applyingTietze transformations

3 Apply Knuth-Bendix completion algorithm, toyield normal form of each group element

Otherwise, Enc is also hard-to-compute

Current problems:

Knuth-Bendix algorithm may not terminate

Is it really secure?

(c) Koji Nuida December 19, 2016 CRISMATH 35/41

Page 104: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Other Topics (1) Set Families and Cryptosystems

t-cover-free family: Each set is not covered byunion of any other t sets

Application to “stronger” encryption: (Roughlyspeaking) ciphertext is secure even if other tciphertexts are decoded by attacker

Idea: A set indicates “set of encryption keysfor a ciphertext”, then at least one keyremains safe even when t ciphertexts arestolen

(c) Koji Nuida December 19, 2016 CRISMATH 36/41

Page 105: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Other Topics (2) Polynomial Interpolation and SecretSharing

Fact: Degree-n polynomial is uniquelydetermined by n + 1 points

Applicable to secret sharing [Shamir 1979]

Each user holds one point (at outside y -axis)Sufficient # of users can recover thepolynomial, whose y -intercept is the secretvalueInsufficient # of points have no info. on thepolynomial (y -intercept can be stillarbitrary), hence secret

Related to the talk by Y. Suga

(c) Koji Nuida December 19, 2016 CRISMATH 37/41

Page 106: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Other Topics (3) Homomorphic Encryption from IdealClass Groups

Additive HE based on ideal class groups of(non-maximal order of) imaginary quadraticfields Q(

√D) (in CT-RSA 2015)

Security under consideration: Efficient algorithmto (approximately) compute the class numberwill break the cryptosystem

(c) Koji Nuida December 19, 2016 CRISMATH 38/41

Page 107: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Other Topics (4) Gaussian Quadrature and ContentProtection

Gaussian quadrature: Express integral ofpolynomial over interval as a finite weighted sumof polynomial values (at some specific points)

Such choice of points/weights can be applied togood parameter choice in some cryptographicscheme for content protection (digital rightsmanagement) [N. et al. 2007]

(c) Koji Nuida December 19, 2016 CRISMATH 39/41

Page 108: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Other Topics (5) abc Conjecture for Cryptographic Study

Recent study by Y. Hashimoto, K. Shinagawa,N. et al.: Some kind of cryptographic algorithmby physical cards

A part of result: A lower bound for suchalgorithms in certain setting, derived from abcConjecture, Prime Number Theorem, Konig’sLemma, etc.

Affimative result also: Application of“permutations of same type are conjugate toeach other”

To be presented in SCIS 2017

(c) Koji Nuida December 19, 2016 CRISMATH 40/41

Page 109: Cryptography, Information Security, and …coop-math.ism.ac.jp/files/231/20161219_Nuida.pdf2016/12/19  · Cryptography, Information Security, and Mathematics: Recent Advances 縫田

Conclusion

Q. What kind of math. are useful in crypto.(and/or other “practical” topics)?

A. Unpredictable!

I am now trying to apply techniques from settheory, computability theory, ...

(c) Koji Nuida December 19, 2016 CRISMATH 41/41