CSE206A: Lattices Algorithms and Applications (Fall 2017)
Tue,Thu 12:30pm-1:50pm in CSE 4258
Section ID: 915233
Instructor: Daniele Micciancio
Monday 10am-11am, in CSE 4214
Point lattices are powerful mathematical objects that can be used to efficiently solve many important problems in computer science, most notably in the areas of cryptography and combinatorial optimization. This course gives a general introduction to the theory of point lattices, their algorithms, computational complexity, mathematical techniques, and applications to cryptography. Specific topics touched by the course include:
- Lattice Based Cryptography: the design of cryptographic functions that are as hard to break as solving hard lattice problems. From basic public key encryption and digital signature schemes, to advanced applications like identity based encryption and fully homomorphic encryption, i.e., encryption schemes that allow to compute on encrypted data without decrypting.
- Algorithms: approximation algorithms for the efficient solution of lattice approximation problems, exponential time algorithms for the exact solution of NP-hard lattice problems.
- Computational Complexity: connection between average-case and worst-case complexity, reductions, NP-hardness, interactive proof systems.
- Advanced mathematical techniques: Fourier/Harmonic analysis methods for the study of lattice problems. Lattice problems from Algebraic Number Theory and their application to the design of very efficient cryptographic functions.
- Other Applications: If time permits, applications to lattices in coding theory (error correction), combinatorial optimization (integer programming), and more.
Prerequisites and Coursework
The main prerequisites for the course are general mathematical maturity, knowledge of basic mathematics (good linear algebra and probability theory, basic abstract algebra, and a little bit of calculus) and introductory level algorithms and complexity theory (mathematical models of computation, analysis of algorithms, polynomial time solvability, NP-hardness, etc.) Some prior knowledge of cryptography is useful, but not strictly required. No prior knowledge of advanced complexity theory, Fourier analysis, or algebraic number theory is assumed, but you should be prepared to learn a bit about all this through the course.
Coursework for students enrolled in the course will include a substantial amount of reading, 2 or 3 individual homework assignments, and a team project to be executed in groups of 2 or 3 students. Projects should be discussed with the instructor by the end of the 5th week of classes, and will be due during the 10th week. Each group should submit a written report, and possibly deliver a short presentation.
The course will be based on a combination of lecture notes, research papers and other online material as posted below. Links below the line are reading material from the last offering of the course. The list will be updated as the course moves forward.
- Point Lattices: Lattices, Bases, Gram-Schmidt orthogonalization, and Lattice determinant.
- Minkowski's Theorem: The Shortest Vector Problem (SVP), Shortest Independent Vectors Problem (SIVP), and Minkowski's Theorems.
- Cryptanalysis: Pseudorandom generators, Truncated Linear Congruential Generator, Subset-sum generator, Closest Vector Problem and Bounded Distance Decoding, Lattice attacks on LCG and SubsetSum generators.
- Basis reduction and the LLL algorithm, with applications to the approximate solution of SVP and SIVP.
- Asymptotically Efficient Lattice-Based Digital Signatures J. Cryptology 2017. Preliminary version in TCC 2008.
- Duality: The dual lattice and the Closest Vector Problem (CVP)
- Lattice Cryptography: Random lattices, their properties, and construction of basic cryptographic primitives, like one-way functions and public key encryption.
Fourier analsysis: the discrete gaussian distribution, possion summation formula, tail bounds, the smoothing parameter, etc.
- Pseudorandomness of subset-sum function: See original paper Efficient Cryptographic Schemes Provably as Secure as Subset Sum (R. Impagliazzo & M. Naor, J. Cryptology 1996)
- Basic Algorithms for Gram-Schmidt orthogonalization, Hermite Normal Form computation, Nearest plane approximation algorithm, and Enumeration algorithms for exact CVP computation.
Better Key Sizes (and Attacks) for LWE-Based Encryption (Lindner & Peikert, CT-RSA 2011). The encryption scheme presented in class is almost identical to the one in section 3 of the paper. There are also some preliminary lecture notes covering the part the lecture on relating different variants of LWE.
A collection of Links to papers and other resources on lattice cryptography and algorithms (not very actively) maintained by Daniele Micciancio, mostly for his own personal use.
Introductory chapters and surveys on lattice cryptography:
Other courses' webpages:
Implementations and Libraries:
- fpLLL: state of the art impementation of lattice reduction and related algorithms using fast floating point arithmetics.
- Number Theory Library (NTL). A C++ library for lattice basis reduction, polynomial arithmetics and other algebraic problems.
- PALISADE. A general purpose C++ library for lattice cryptography.
- Lambda o lambda (Lol). A high level Haskell library for lattice based cryptography. See also paper.
- NFLlib. An NTT-based Fast Lattice Library for computations in power-of-two cyclotomic rings.
- HElib. A library for Fully Homomorphic Encryption.
- RingLWE C++ library: A C++implementation of the RingLWE Toolkit of Lyubashevsky, Peikert and Regev, as described in the MS Thesis.