Paper 2013/419
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin, Sara Krehbiel, and Chris Peikert
Abstract
We develop secure \emph{threshold} protocols for two important operations in lattice cryptography, namely, generating a hard lattice $\Lambda$ together with a ``strong'' trapdoor, and sampling from a discrete Gaussian distribution over a desired coset of $\Lambda$ using the trapdoor. These are the central operations of many cryptographic schemes: for example, they are exactly the key-generation and signing operations (respectively) for the GPV signature scheme, and they are the public parameter generation and private key extraction operations (respectively) for the GPV IBE. We also provide a protocol for trapdoor delegation, which is used in lattice-based hierarchical IBE schemes. Our work therefore directly transfers all these systems to the threshold setting. Our protocols provide information-theoretic (i.e., statistical) security against adaptive corruptions in the UC framework, and they are private and robust against an optimal number of semi-honest or malicious parties. Our Gaussian sampling protocol is both noninteractive and efficient, assuming either a trusted setup phase (e.g., performed as part of key generation) or a sufficient amount of interactive but offline precomputation, which can be performed before the inputs to the sampling phase are known.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. This is the full version of the paper from ACNS '13
- Keywords
- latticesthreshold protocols
- Contact author(s)
- cpeikert @ cc gatech edu
- History
- 2013-07-02: received
- Short URL
- https://ia.cr/2013/419
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/419, author = {Rikke Bendlin and Sara Krehbiel and Chris Peikert}, title = {How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H){IBE}}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/419}, year = {2013}, url = {https://eprint.iacr.org/2013/419} }