Topics in Lattice-based Cryptography
Lead Research Organisation:
Royal Holloway University of London
Department Name: Information Security
Abstract
Since the National Institute for Standards & Technology (NIST) began their efforts in standardising post-quandum cryptographic schemes in 2016, lattice-based cryptography has been recognised as one of the most viable candidates for eventual real-world use. This thesis explores aspects of hard computational problems based on lattices, and aims to analyse them and use them in the construction of cryptographic primitives in new ways.
One such hard computational problem is the Lattice Isomorphism Problem (LIP), introduced to cryptography first by Regev and Haviv (2014), and then again in two independent concurrent works by Ducas and van Woerden (2022), and Bennett et. al. (2023). The decision version asks one to determine whether, given two lattices, there exists an isometry between them, that is an isomorphism that preserves the inner product given by the ambient space in which the two lattices are embedded. The search version tasks one with finding one such isometry. Algebraically, LIP can be interpreted as an equivalence problem between the Gram matrices of the given lattices, which yields an interpretation of LIP as a group action. This thesis examines the cryptographic properties of the LIP group action, using the standard definitional framework from the theory of cryptographic group actions dating back to Brassard and Yung (1990), and recently revitalised by Alamati et. al. (2020).
One such hard computational problem is the Lattice Isomorphism Problem (LIP), introduced to cryptography first by Regev and Haviv (2014), and then again in two independent concurrent works by Ducas and van Woerden (2022), and Bennett et. al. (2023). The decision version asks one to determine whether, given two lattices, there exists an isometry between them, that is an isomorphism that preserves the inner product given by the ambient space in which the two lattices are embedded. The search version tasks one with finding one such isometry. Algebraically, LIP can be interpreted as an equivalence problem between the Gram matrices of the given lattices, which yields an interpretation of LIP as a group action. This thesis examines the cryptographic properties of the LIP group action, using the standard definitional framework from the theory of cryptographic group actions dating back to Brassard and Yung (1990), and recently revitalised by Alamati et. al. (2020).
Planned Impact
People. The most obvious impact of RHUL's cyber security CDT will be its production of 50 PhD-level graduates during its lifetime. CDT graduates will be "industry-ready": through industry placements, they will have exposure to real-world cyber security problems and working environments; because of the breadth of our training programme, they will gain exposure to cyber security in all its forms; through involvement of our external partners at all stages of the CDT, the students will be exposed to the language and culture of industry, government and other sectors. At the same time, they will benefit from generic skills training, equipping them with a broad set of skills that will be of use in their subsequent workplaces. They will also engage in PhD-level research projects that will lead to them developing deep topic-specific knowledge as well as general analytical skills. There is a growing demand for graduates with these skill-sets. While RHUL already has demonstrably close relationships with key external players, our CDT represents an opportunity for us to enhance our existing links and develop new ones. Moreover, our own research will be strengthened by working with the best external researchers.
Economy. The nature of our cyber security research and the planned industrial involvement in influencing the selection of research topics means that there will be significant commercialisation opportunities arising from the research produced by this CDT. RHUL cyber security researchers have more than 80 years of experience working in industry, either in research, development or customer-facing environments, and are named inventors on more than 30 patents. We are closely supported by the Royal Holloway Enterprise Centre, who have expertise in business development, securing venture capital funding, and IPR protection. RHUL's Institute for Cyber Security Innovation provides business research and training support. We also have an on-campus incubation centre which has hosted a number of spin-out companies. We are thus thoroughly prepared to identify and exploit commercialisation opportunities arising from the CDT.
Knowledge. The CDT will make substantial and original contributions to knowledge in cyber security. Following institutional policy, all research is made available to the public for free in some form, either through open access publishing,the institution's research repository or via subject-specific on-line archives. The research will also published in conference venues which, by their nature, are regularly attended by large numbers of delegates from outside of academia. Other impact routes for our knowledge include Industry Fora (RHUL is an active academic member of the I4 and ISF organisations, which are influential industry fora), Business Events (RHUL researchers regularly speak at events such as InfoSec London, RSA Conference), Standards Bodies (several staff are active in international standards bodies), Consulting (staff have consulted for more than 100 organisations in the last 30 years), Industry-focused Events (RHUL hosts several external facing events each year, including the annual CDT Showcase, HP Colloquium, and ISG Open Day).
Society. One of the longer-term impacts of our research is to provide mechanisms that help to enhance confidence and trust in the on-line society for ordinary citizens, leading in turn to quality of life enhancement. Our work on the socio-technical dimensions of security and privacy gives us a means to influence government policy to the betterment of society at large. We work closely with government departments such as the Cabinet Office to provide advice on privacy, security and design issues. We also communicate research findings through more widely accessible media, press engagement, speaking at public events, and working with schools (CDT students will take part in the annual Smallpeice Trust Cyber Security residential for Year 9 students).
Economy. The nature of our cyber security research and the planned industrial involvement in influencing the selection of research topics means that there will be significant commercialisation opportunities arising from the research produced by this CDT. RHUL cyber security researchers have more than 80 years of experience working in industry, either in research, development or customer-facing environments, and are named inventors on more than 30 patents. We are closely supported by the Royal Holloway Enterprise Centre, who have expertise in business development, securing venture capital funding, and IPR protection. RHUL's Institute for Cyber Security Innovation provides business research and training support. We also have an on-campus incubation centre which has hosted a number of spin-out companies. We are thus thoroughly prepared to identify and exploit commercialisation opportunities arising from the CDT.
Knowledge. The CDT will make substantial and original contributions to knowledge in cyber security. Following institutional policy, all research is made available to the public for free in some form, either through open access publishing,the institution's research repository or via subject-specific on-line archives. The research will also published in conference venues which, by their nature, are regularly attended by large numbers of delegates from outside of academia. Other impact routes for our knowledge include Industry Fora (RHUL is an active academic member of the I4 and ISF organisations, which are influential industry fora), Business Events (RHUL researchers regularly speak at events such as InfoSec London, RSA Conference), Standards Bodies (several staff are active in international standards bodies), Consulting (staff have consulted for more than 100 organisations in the last 30 years), Industry-focused Events (RHUL hosts several external facing events each year, including the annual CDT Showcase, HP Colloquium, and ISG Open Day).
Society. One of the longer-term impacts of our research is to provide mechanisms that help to enhance confidence and trust in the on-line society for ordinary citizens, leading in turn to quality of life enhancement. Our work on the socio-technical dimensions of security and privacy gives us a means to influence government policy to the betterment of society at large. We work closely with government departments such as the Cabinet Office to provide advice on privacy, security and design issues. We also communicate research findings through more widely accessible media, press engagement, speaking at public events, and working with schools (CDT students will take part in the annual Smallpeice Trust Cyber Security residential for Year 9 students).
People |
ORCID iD |
| Benjamin Bencina (Student) |
Studentship Projects
| Project Reference | Relationship | Related To | Start | End | Student Name |
|---|---|---|---|---|---|
| EP/S021817/1 | 30/09/2019 | 30/03/2028 | |||
| 2709723 | Studentship | EP/S021817/1 | 30/09/2022 | 29/09/2026 | Benjamin Bencina |