Skip to main content

Showing 1–11 of 11 results for author: Peikert, C

.
  1. arXiv:2202.07736  [pdf, ps, other

    cs.CC

    Hardness of the (Approximate) Shortest Vector Problem: A Simple Proof via Reed-Solomon Codes

    Authors: Huck Bennett, Chris Peikert

    Abstract: $\newcommand{\NP}{\mathsf{NP}}\newcommand{\GapSVP}{\textrm{GapSVP}}$We give a simple proof that the (approximate, decisional) Shortest Vector Problem is $\NP$-hard under a randomized reduction. Specifically, we show that for any $p \geq 1$ and any constant $γ< 2^{1/p}$, the $γ$-approximate problem in the $\ell_p$ norm ($γ$-$\GapSVP_p$) is not in $\mathsf{RP}$ unless $\NP \subseteq \mathsf{RP}… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  2. arXiv:2109.05371  [pdf, other

    cs.CR cs.AR

    F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version)

    Authors: Axel Feldmann, Nikola Samardzic, Aleksandar Krastev, Srini Devadas, Ron Dreslinski, Karim Eldefrawy, Nicholas Genise, Chris Peikert, Daniel Sanchez

    Abstract: Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted serves. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude slower than computing on unencrypted data. These overheads are a major barrier to FHE's widespread adoption. We present F1, the first FHE accelerator that is pr… ▽ More

    Submitted 25 September, 2021; v1 submitted 11 September, 2021; originally announced September 2021.

  3. arXiv:2109.04025  [pdf, other

    cs.CC cs.CR cs.DS

    Improved Hardness of BDD and SVP Under Gap-(S)ETH

    Authors: Huck Bennett, Chris Peikert, Yi Tang

    Abstract: We show improved fine-grained hardness of two key lattice problems in the $\ell_p$ norm: Bounded Distance Decoding to within an $α$ factor of the minimum distance ($\mathrm{BDD}_{p, α}$) and the (decisional) $γ$-approximate Shortest Vector Problem ($\mathrm{SVP}_{p,γ}$), assuming variants of the Gap (Strong) Exponential Time Hypothesis (Gap-(S)ETH). Specifically, we show: 1. For all… ▽ More

    Submitted 25 January, 2022; v1 submitted 8 September, 2021; originally announced September 2021.

    Comments: ITCS 2022

  4. arXiv:2010.04809  [pdf, ps, other

    cs.IT cs.DS

    Lattice (List) Decoding Near Minkowski's Inequality

    Authors: Ethan Mook, Chris Peikert

    Abstract: Minkowski proved that any $n$-dimensional lattice of unit determinant has a nonzero vector of Euclidean norm at most $\sqrt{n}$; in fact, there are $2^{Ω(n)}$ such lattice vectors. Lattices whose minimum distances come close to Minkowski's bound provide excellent sphere packings and error-correcting codes in $\mathbb{R}^{n}$. The focus of this work is a certain family of efficiently constructibl… ▽ More

    Submitted 9 September, 2021; v1 submitted 9 October, 2020; originally announced October 2020.

    Comments: 14 pages, 2 figures

    ACM Class: E.4

  5. arXiv:2003.07903  [pdf, other

    cs.CC cs.DS

    Hardness of Bounded Distance Decoding on Lattices in $\ell_p$ Norms

    Authors: Huck Bennett, Chris Peikert

    Abstract: $ \newcommand{\Z}{\mathbb{Z}} \newcommand{\eps}{\varepsilon} \newcommand{\cc}[1]{\mathsf{#1}} \newcommand{\NP}{\cc{NP}} \newcommand{\problem}[1]{\mathrm{#1}} \newcommand{\BDD}{\problem{BDD}} $Bounded Distance Decoding $\BDD_{p,α}$ is the problem of decoding a lattice when the target point is promised to be within an $α$ factor of the minimum distance of the lattice, in the $\ell_{p}… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

  6. Outsourcing Computation: the Minimal Refereed Mechanism

    Authors: Yuqing Kong, Chris Peikert, Grant Schoenebeck, Biaoshuai Tao

    Abstract: We consider a setting where a verifier with limited computation power delegates a resource intensive computation task---which requires a $T\times S$ computation tableau---to two provers where the provers are rational in that each prover maximizes their own payoff---taking into account losses incurred by the cost of computation. We design a mechanism called the Minimal Refereed Mechanism (MRM) such… ▽ More

    Submitted 5 December, 2019; v1 submitted 31 October, 2019; originally announced October 2019.

    Comments: 17 pages, 1 figure; WINE 2019: The 15th Conference on Web and Internet Economics

    Journal ref: Caragiannis, I., Mirrokni, V., Nikolova, E. (eds) Web and Internet Economics. WINE 2019. Lecture Notes in Computer Science(), vol 11920. Springer, Cham

  7. arXiv:1909.07353  [pdf

    cs.CY

    Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility

    Authors: David Ott, Christopher Peikert, other workshop participants

    Abstract: The implications of sufficiently large quantum computers for widely used public-key cryptography is well-documented and increasingly discussed by the security community. An April 2016 report by the National Institute of Standards and Technology (NIST), notably, calls out the need for new standards to replace cryptosystems based on integer factorization and discrete logarithm problems, which have b… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: A Computing Community Consortium (CCC) workshop report, 30 pages

    Report number: ccc2019report_5

  8. arXiv:1412.7979  [pdf, ps, other

    cs.CC

    On the Lattice Smoothing Parameter Problem

    Authors: Kai-Min Chung, Daniel Dadush, Feng-Hao Liu, Chris Peikert

    Abstract: The smoothing parameter $η_ε(\mathcal{L})$ of a Euclidean lattice $\mathcal{L}$, introduced by Micciancio and Regev (FOCS'04; SICOMP'07), is (informally) the smallest amount of Gaussian noise that "smooths out" the discrete structure of $\mathcal{L}$ (up to error $ε$). It plays a central role in the best known worst-case/average-case reductions for lattice problems, a wealth of lattice-based crypt… ▽ More

    Submitted 26 December, 2014; originally announced December 2014.

  9. arXiv:1306.0281  [pdf, ps, other

    cs.CC cs.CR

    Classical Hardness of Learning with Errors

    Authors: Zvika Brakerski, Adeline Langlois, Chris Peikert, Oded Regev, Damien Stehlé

    Abstract: We show that the Learning with Errors (LWE) problem is classically at least as hard as standard worst-case lattice problems, even with polynomial modulus. Previously this was only known under quantum reductions. Our techniques capture the tradeoff between the dimension and the modulus of LWE instances, leading to a much better understanding of the landscape of the problem. The proof is inspired… ▽ More

    Submitted 2 June, 2013; originally announced June 2013.

    Comments: Preliminary version in STOC'13

  10. arXiv:1112.1994  [pdf, ps, other

    cs.IT cs.CC cs.DS

    List Decoding Barnes-Wall Lattices

    Authors: Elena Grigorescu, Chris Peikert

    Abstract: The question of list decoding error-correcting codes over finite fields (under the Hamming metric) has been widely studied in recent years. Motivated by the similar discrete structure of linear codes and point lattices in R^N, and their many shared applications across complexity theory, cryptography, and coding theory, we initiate the study of list decoding for lattices. Namely: for a lattice L in… ▽ More

    Submitted 6 April, 2012; v1 submitted 8 December, 2011; originally announced December 2011.

  11. arXiv:1011.5666  [pdf, ps, other

    cs.DS cs.CG

    Enumerative Lattice Algorithms in Any Norm via M-Ellipsoid Coverings

    Authors: Daniel Dadush, Chris Peikert, Santosh Vempala

    Abstract: We give a novel algorithm for enumerating lattice points in any convex body, and give applications to several classic lattice problems, including the Shortest and Closest Vector Problems (SVP and CVP, respectively) and Integer Programming (IP). Our enumeration technique relies on a classical concept from asymptotic convex geometry known as the M-ellipsoid, and uses as a crucial subroutine the rece… ▽ More

    Submitted 12 June, 2011; v1 submitted 25 November, 2010; originally announced November 2010.