CryptoDB
Nam Tran
Publications and invited talks
Year
Venue
Title
2025
ASIACRYPT
Lattice-Based Group Signatures in the Standard Model, Revisited
Abstract
The study of lattice-based group signatures has been a prominent research direction since 2010. While recent advances in the field have yielded schemes in the random oracle model with strong security properties and nearly practical efficiency, the current state of affairs for lattice-based group signatures in the standard model is still much less satisfactory. Existing schemes, proposed by Katsumata and Yamada (EUROCRYPT’19) or implied by generic non-interactive zero-knowledge proofs for NP (by Peikert and Shiehian at CRYPTO’19 and by Waters at STOC’24), either only fulfil a weak notion of anonymity called selfless anonymity, or require a strong lattice assumption, or suffer from extremely large signatures and/or public keys.
This work aims to enhance the state of affairs for lattice-based group signatures in the standard model. We provide improved constructions that simultaneously achieves: (i) signature and public key sizes significantly smaller than those of known schemes; (ii) full anonymity in the CPA and CCA senses; (iii) security based on standard SIS and LWE assumptions with polynomial approximation factors regarding worst-case lattice problems (in general lattices). Our design approach slightly departs from that of existing pairing-based and lattice-based constructions. In the design process, we adapt and develop several lattice-based cryptographic ingredients that may be of independent interest. At the heart of our constructions is a reasonably efficient non-interactive zero-knowledge proof system for relations typically appearing in advanced
privacy-preserving lattice-based cryptographic protocols. These relations are addressed by a trapdoor Σ-protocol with an inverse polynomial soundness error, which is made non-interactive via the standard-model Fiat-Shamir transform of Canetti et al. (STOC’19) and a compiler by Libert et al. (ASIACRYPT’20).
2023
CRYPTO
Reductions from module lattices to free module lattices, and application to dequantizing module-LLL
Abstract
In this article, we give evidences that free modules (i.e., modules
which admit a basis) are no weaker than arbitrary modules, when
it comes to solving cryptographic algorithmic problems (and when the
rank of the module is at least 2). More precisely, we show that for three
algorithmic problems used in cryptography, namely the shortest vector
problem, the Hermite shortest vector problem and a variant of the closest
vector problem, there is a reduction from solving the problem in any
module of rank n ≥ 2 to solving the problem in any free module of the
same rank n. As an application, we show that this can be used to dequantize the LLL algorithm for module lattices presented by Lee et al. (Asiacrypt 2019).
Coauthors
- Dongxi Liu (1)
- Daniele Micciancio (1)
- Gabrielle De Micheli (1)
- Khoa Nguyen (1)
- Alice Pellet-Mary (1)
- Josef Pieprzyk (1)
- Willy Susilo (1)
- Nam Tran (2)