22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

is a coset of the lattice Λ = L( [ ] √<br />

R<br />

I<br />

). It remains to show that r Σ3 ≥ η ɛ (Λ), so that the rightmost term<br />

in (5.1) above is essentially a constant (up to some factor in [ 1−ɛ<br />

1+ɛ<br />

, 1]) independent of ¯x, by Lemma 2.5. Then<br />

we can conclude that p¯x ∈ [ 1−ɛ<br />

1+ɛ , 1+ɛ<br />

1−ɛ ] · ρ r √ Σ<br />

(¯x), from which the theorem follows.<br />

To show that r √ Σ 3 ≥ η ɛ (Λ), note that since Λ ∗ ⊂ V , for any covariance Π we have ρ √<br />

P Π<br />

(Λ ∗ ) =<br />

ρ √ Π (Λ∗ ), and so P √ Π ≥ η ɛ (Λ) if and only if √ Π ≥ η ɛ (Λ). Now because both Σ p , Σ y ≥ 2 [ ]<br />

R<br />

I<br />

[ R t I ], we<br />

have<br />

Σ + p + Σ + y ≤ ( [ ]<br />

R<br />

I<br />

[ R t I ]) + .<br />

Because r [ ]<br />

R<br />

I<br />

≥ ηɛ (Λ) for ɛ = negl(n) by Lemma 2.3, we have r √ √<br />

Σ 3 = r (Σ + p + Σ + y ) + ≥ η ɛ (Λ), as<br />

desired.<br />

5.5 Trapdoor Delegation<br />

Here we describe very simple and efficient mechanism for securely delegating a trapdoor for A ∈ Z n×m<br />

q<br />

to a trapdoor for an extension A ′ ∈ Z n×m′<br />

q of A. Our method has several advantages over the previous<br />

basis delegation algorithm of [CHKP10]: first and most importantly, the size of the delegated trapdoor grows<br />

only linearly with the dimension m ′ of Λ ⊥ (A ′ ), rather than quadratically. Second, the algorithm is much<br />

more efficient, because it does not require testing linear independence of Gaussian samples, nor computing<br />

the expensive ToBasis and Hermite normal form operations. Third, the resulting trapdoor R has a ‘nice’<br />

Gaussian distribution that is easy to analyze and may be useful in applications. We do note that while the<br />

delegation algorithm from [CHKP10] works for any extension A ′ of A (including A itself), ours requires<br />

m ′ ≥ m + w. Fortunately, this is frequently the case in applications such as HIBE and others that use<br />

delegation.<br />

Algorithm 4 Efficient algorithm DelTrap O (A ′ = [A | A 1 ], H ′ , s ′ ) for delegating a trapdoor.<br />

Input: an oracle O for discrete Gaussian sampling over cosets of Λ = Λ ⊥ (A) with parameter s ′ ≥ η ɛ (Λ).<br />

• parity-check matrix A ′ = [A | A 1 ] ∈ Z n×m<br />

q × Z n×w<br />

q ;<br />

• invertible matrix H ′ ∈ Z n×n<br />

q ;<br />

Output: a trapdoor R ′ ∈ Z m×w for A ′ with tag H ∈ Z n×n<br />

q .<br />

1: Using O, sample each column of R ′ independently from a discrete Gaussian with parameter s ′ over the<br />

appropriate coset of Λ ⊥ (A), so that AR ′ = H ′ G − A 1 .<br />

Usually, the oracle O needed by Algorithm 4 would be implemented (up to negl(n) statistical distance) by<br />

Algorithm 3 above, using a trapdoor R for A where s 1 (R) is sufficiently small relative to s ′ . The following<br />

is immediate from Lemma 2.9 and the fact that the columns of R ′ are independent and negl(n)-subgaussian.<br />

A relatively tight bound on the hidden constant factor can also be derived from Lemma 2.9.<br />

Lemma 5.7. For any valid inputs A ′ and H ′ , Algorithm 4 outputs a trapdoor R ′ for A ′ with tag H ′ , whose<br />

distribution is the same for any valid implementation of O, and s 1 (R ′ ) ≤ s ′ · O( √ m + √ w) except with<br />

negligible probability.<br />

29<br />

4. Trapdoors for Lattices

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!