Abstract
Approximating the shortest vector of a given lattice is one of the most important computational problems in public-key cryptanalysis and lattice-based cryptography. However, existing LLL reduction algorithm and its variants for this problem are too time-consuming for resource-constrained clients. To handle this dilemma, in this paper, we propose an efficient and secure outsourcing algorithm under the cloud environment. Compared with the prior Liu et al.’s algorithm, besides realizing the privacy preservation of client’s input/output information, satisfying verifiability and greatly reducing the local-client’s computational overhead, our algorithm is superior in the following aspects. First, our algorithm is technically concise. The main technique ingredient involved in our algorithm is a skillful combination of the unimodular matrix transformation and the Gram matrix, which is concise and effective. Second, our algorithm does not reduce the quality of the reduced basis, that is, the vector finally obtained by the client is as short as that of the vector generated by the client directly performing the existing reduction algorithm. Last but not least, our algorithm not only works for the LLL reduction algorithm, but also for any other algorithms that solve (approximate-)SVP with Euclidean norm.
This work is supported by National Key Research and Development Program of China (No. 2018YFA0704705, 2020YFA0712300), National Natural Science Foundation of China (No. 61702294, 62032009), National Development Foundation of Cryptography (MMJJ20170126).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ajtai, M.: The shortest vector problem in L\({}_{\text{2}}\) is NP-hard for randomized reductions (extended abstract). In: Vitter, J.S. (ed.) Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, 23–26 May 1998, pp. 10–19. ACM (1998). https://doi.org/10.1145/276698.276705
Backes, W., Wetzel, S.: An efficient LLL gram using buffered transformations. In: Ganzha, V.G., Mayr, E.W., Vorozhtsov, E.V. (eds.) CASC 2007. LNCS, vol. 4770, pp. 31–44. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75187-8_4
Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Korba, L., Marsh, S., Safavi-Naini, R. (eds.) Sixth Annual Conference on Privacy, Security and Trust, PST 2008, Fredericton, New Brunswick, Canada, 1–3 October 2008, pp. 240–245. IEEE Computer Society (2008). https://doi.org/10.1109/PST.2008.12
Bi, J., Coron, J., Faugère, J., Nguyen, P.Q., Renault, G., Zeitoun, R.: Rounding and chaining LLL: finding faster small roots of univariate polynomial congruences. IACR Cryptol. ePrint Arch. 2014, 437 (2014). http://eprint.iacr.org/2014/437
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9), 2386–2396 (2014). https://doi.org/10.1109/TPDS.2013.180
Cohen, H.: A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics, vol. 138. Springer, Heidelberg (1993). https://www.worldcat.org/oclc/27810276
Coppersmith, D.: Finding a small root of a univariate modular equation. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 155–165. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_14
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) The ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 16–18 October 2012, pp. 501–512. ACM (2012). https://doi.org/10.1145/2382196.2382250
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_25
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, 17–20 May 2008, pp. 197–206. ACM (2008). https://doi.org/10.1145/1374376.1374407
Håstad, J., Just, B., Lagarias, J.C., Schnorr, C.: Polynomial time algorithms for finding integer relations among real numbers. SIAM J. Comput. 18(5), 859–881 (1989). https://doi.org/10.1137/0218059
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_15
Hu, C., Alhothaily, A., Alrawais, A., Cheng, X., Sturtivant, C., Liu, H.: A secure and verifiable outsourcing scheme for matrix inverse computation. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, 1–4 May 2017, pp. 1–9. IEEE (2017). https://doi.org/10.1109/INFOCOM.2017.8057199
Lagrange, J.L.: Recherches d’arithmétique. Proc. Nouv. Mém. Acad. (1773)
Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 261(4), 515–534 (1982)
Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Moriai, S., Jaeger, T., Sakurai, K. (eds.) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014, Kyoto, Japan, 03–06 June 2014, pp. 123–134. ACM (2014). https://doi.org/10.1145/2590296.2590332
Liu, J., Bi, J.: Secure outsourcing of lattice basis reduction. In: Gedeon, T., Wong, K.W., Lee, M. (eds.) ICONIP 2019, Part II. LNCS, vol. 11954, pp. 603–615. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36711-4_51
Nguên, P.Q., Stehlé, D.: Floating-point LLL revisited. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 215–233. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_13
Nguyen, P.Q., Stehlé, D.: LLL on the average. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 238–256. Springer, Heidelberg (2006). https://doi.org/10.1007/11792086_18
Saruchi, Morel, I., Stehlé, D., Villard, G.: LLL reducing with the most significant bits. In: Nabeshima, K., Nagasaka, K., Winkler, F., Szántó, Á. (eds.) International Symposium on Symbolic and Algebraic Computation, ISSAC 20, Kobe, Japan, 23–25 July 2014, pp. 367–374. ACM (2014). https://doi.org/10.1145/2608628.2608645
Schnorr, C.: A hierarchy of polynomial time lattice basis reduction algorithms. Theor. Comput. Sci. 53, 201–224 (1987). https://doi.org/10.1016/0304-3975(87)90064-8
Schnorr, C.P.: Factoring integers and computing discrete logarithms via diophantine approximation. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 281–293. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_24
The Sage Developers: SageMath, the Sage Mathematics Software System (Version 9.2) (2020). https://www.sagemath.org
Tian, C., Yu, J., Zhang, H., Xue, H., Wang, C., Ren, K.: Novel secure outsourcing of modular inversion for arbitrary and variable modulus. IEEE Trans. Serv. Comput., 1 (2019). https://doi.org/10.1109/TSC.2019.2937486
Yang, Y., et al.: A comprehensive survey on secure outsourced computation and its applications. IEEE Access 7, 159426–159465 (2019). https://doi.org/10.1109/ACCESS.2019.2949782
Zhang, F., Ma, X., Liu, S.: Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286, 19–28 (2014). https://doi.org/10.1016/j.ins.2014.07.017
Zhang, H., Yu, J., Tian, C., Xu, G., Gao, P., Lin, J.: Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things. IEEE Internet Things J. 7(4), 2968–2981 (2020). https://doi.org/10.1109/JIOT.2020.2964015
Zhang, L., Zhang, H., Yu, J., Xian, H.: Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535, 142–155 (2020). https://doi.org/10.1016/j.ins.2020.05.054
Zheng, Y., Tian, C., Zhang, H., Yu, J., Li, F.: Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121, 18–33 (2021). https://doi.org/10.1016/j.jcss.2021.04.006. https://www.sciencedirect.com/science/article/pii/S0022000021000441
Acknowledgements
We thank the anonymous referees for their valuable suggestions on how to improve this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, X., Pan, Y., Tian, C. (2021). Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem. In: Deng, R., et al. Information Security Practice and Experience. ISPEC 2021. Lecture Notes in Computer Science(), vol 13107. Springer, Cham. https://doi.org/10.1007/978-3-030-93206-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-93206-0_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93205-3
Online ISBN: 978-3-030-93206-0
eBook Packages: Computer ScienceComputer Science (R0)