Advanced Topics in Cryptography - Lattices (Fall 2022)
Lattices in complexity theory, cryptography, and quantum computation.
Monday 9:50 - 12:15, 6B201
Office hour: Monday 13:30 - 14:30
Email: [email protected]
TAs: Zewen Fan, Xiaxi Ye
Main reference for lattice and complexity theory:
Micciancio and Goldwasser: Complexity of lattice problems: A cryptographic perspective
Micciancio and Goldwasser: Complexity of lattice problems: A cryptographic perspective
Websites/Lecture notes/Surveys related to lattices:
Damien Stehle's collection of lattice papers [ site ]
Oded Regev 2004 [ site ]
Vinod Vaikuntanathan 2015 [ site ] 2020 [ site ]
Daniele Micciancio 2016 [ site ]
TAU lattice course 2019 [ site ]
H. Lenstra: Lattices in number theory, algorithm, and applications [ link ]
A. Joux and J. Stern: Lattice reduction, a toolbox for cryptanalyst [ link ]
P. Q. Nguyen and J. Stern: The two faces of lattice in cryptology [ link ]
Damien Stehle's collection of lattice papers [ site ]
Oded Regev 2004 [ site ]
Vinod Vaikuntanathan 2015 [ site ] 2020 [ site ]
Daniele Micciancio 2016 [ site ]
TAU lattice course 2019 [ site ]
H. Lenstra: Lattices in number theory, algorithm, and applications [ link ]
A. Joux and J. Stern: Lattice reduction, a toolbox for cryptanalyst [ link ]
P. Q. Nguyen and J. Stern: The two faces of lattice in cryptology [ link ]
Main reference for cryptography:
A Course in Cryptography, Rafael Pass & abhi shelat
https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
A Course in Cryptography, Rafael Pass & abhi shelat
https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
A graduate course in applied cryptography, Dan Boneh & Victor Shoup
Foundations of Cryptography I, II, Oded Goldreich
Foundations of Cryptography I, II, Oded Goldreich
Topics:
Part 1: Introduction: Minkowski's two theorems, all what you want to know about lattices
Part 2: Algorithms for SVP and CVP: LLL and others
Part 3: Complexity: NP hardness of CVP, SVP (Ajtai, Micciancio, Khot), NP intersect coNP
Part 4: Worst-case to average-case reduction (LWE, SIS, DCP)
Part 5: The cryptographic applications of SIS and LWE: FHE, lattice trapdoor, IBE, ABE.
Part 6: Quantum and lattices
Part 7: Whatever interesting, if we have time
Last two weeks: Project presentations
Part 1: Introduction: Minkowski's two theorems, all what you want to know about lattices
Part 2: Algorithms for SVP and CVP: LLL and others
Part 3: Complexity: NP hardness of CVP, SVP (Ajtai, Micciancio, Khot), NP intersect coNP
Part 4: Worst-case to average-case reduction (LWE, SIS, DCP)
Part 5: The cryptographic applications of SIS and LWE: FHE, lattice trapdoor, IBE, ABE.
Part 6: Quantum and lattices
Part 7: Whatever interesting, if we have time
Last two weeks: Project presentations
Schedule:
09/12 Moon festival
09/19 Introduction, lattice problems
09/26 Minkowski's theorems, NP hardness of CVP, SVP is no harder than CVP
10/03 National holiday, moved to 11/19
10/10 The LLL algorithm
10/17 Short integer solution and learning with errors, q-ary lattices
10/24 Regev's quantum reduction from GapSVP to LWE
10/31 Fully homomorphic encryption, gadget matrices
11/07 Lattice trapdoor and its applications to signature
11/14 Lattice trapdoor II, identity-based encryption,
11/19 The Bonsai technique, signature without random oracle (substitution for 10/03)
11/21 Attribute-based encryption, open problems
11/28 Multilinear maps from lattices, GGH15
12/05 Witness encryption and program obfuscation from lattices
12/12 Presentation I, RingSIS and RingLWE
12/19 Presentation II
12/26 Presentation III
09/12 Moon festival
09/19 Introduction, lattice problems
09/26 Minkowski's theorems, NP hardness of CVP, SVP is no harder than CVP
10/03 National holiday, moved to 11/19
10/10 The LLL algorithm
10/17 Short integer solution and learning with errors, q-ary lattices
10/24 Regev's quantum reduction from GapSVP to LWE
10/31 Fully homomorphic encryption, gadget matrices
11/07 Lattice trapdoor and its applications to signature
11/14 Lattice trapdoor II, identity-based encryption,
11/19 The Bonsai technique, signature without random oracle (substitution for 10/03)
11/21 Attribute-based encryption, open problems
11/28 Multilinear maps from lattices, GGH15
12/05 Witness encryption and program obfuscation from lattices
12/12 Presentation I, RingSIS and RingLWE
12/19 Presentation II
12/26 Presentation III