cryptographic multilinear map
A cryptographic -multilinear map is a kind of multilinear map, that is, a function such that for any integers and elements , , and which in addition is efficiently computable and satisfies some security properties. It has several applications on cryptography, as key exchange protocols, identity-based encryption, and broadcast encryption. There exist constructions of cryptographic 2-multilinear maps, known as bilinear maps, however, the problem of constructing such multilinear maps for seems much more difficult and the security of the proposed candidates is still unclear.
Definition
= For ''n'' = 2 =
In this case, multilinear maps are mostly known as bilinear maps or pairings, and they are usually defined as follows: Let be two additive cyclic groups of prime order , and another cyclic group of order written multiplicatively. A pairing is a map: , which satisfies the following properties:
; Bilinearity:
; Non-degeneracy: If and are generators of and , respectively, then is a generator of .
; Computability: There exists an efficient algorithm to compute .
In addition, for security purposes, the discrete logarithm problem is required to be hard in both and .
= General case (for any ''n'') =
We say that a map is a -multilinear map if it satisfies the following properties:
- All (for ) and are groups of same order;
- if and , then ;
- the map is non-degenerate in the sense that if are generators of , respectively, then is a generator of
- There exists an efficient algorithm to compute .
In addition, for security purposes, the discrete logarithm problem is required to be hard in .
= Candidates =
All the candidates multilinear maps are actually slightly generalizations of multilinear maps known as graded-encoding systems, since they allow the map to be applied partially: instead of being applied in all the values at once, which would produce a value in the target set , it is possible to apply to some values, which generates values in intermediate target sets. For example, for , it is possible to do then .
The three main candidates are GGH13, which is based on ideals of polynomial rings; CLT13, which is based approximate GCD problem and works over integers, hence, it is supposed to be easier to understand than GGH13 multilinear map; and GGH15, which is based on graphs.
References
{{Reflist|refs=
last1=Dutta|first1=Ratna|
last2=Barua|first2=Rana|
last3=Sarkar|first3=Palash|
title=Pairing-Based Cryptographic Protocols : A Survey|journal=e-Print IACR|
date=2004|
url=https://eprint.iacr.org/2004/064}}
last1=Boneh|first1=Dan|
last2=Silverberg|first2=Alice|title=Topics in Algebraic and Noncommutative Geometry |chapter=Applications of multilinear forms to cryptography |series=Contemporary Mathematics |
date=2003|
volume=324|
pages=71–90|doi=10.1090/conm/324/05731|isbn=9780821832097|
url=http://crypto.stanford.edu/~dabo/abstracts/mlinear.html|
accessdate=14 March 2018}}
{{cite web|last1=Albrecht|first1=Martin R.|
title=Are Graded Encoding Schemes broken yet?|
url=http://malb.io/are-graded-encoding-schemes-broken-yet.html|
accessdate=14 March 2018}}
last1=Koblitz|first1=Neal|
last2=Menezes|first2=Alfred|title=Cryptography and Coding |
chapter=Pairing-Based cryptography at high security levels|
series=Lecture Notes in Computer Science|
date=2005|
volume=3796|pages=13–36 |doi=10.1007/11586821_2|isbn=978-3-540-30276-6 }}
last1=Coron|first1=Jean-Sébastien|
last2=Lepoint|first2=Tancrède|
last3=Tibouchi|first3=Mehdi|title=Advances in Cryptology – CRYPTO 2013 |chapter=Practical Multilinear Maps over the Integers |via=SpringerLink |series=Lecture Notes in Computer Science|
date=2013|volume=8042|
pages=476–493|doi=10.1007/978-3-642-40041-4_26|isbn=978-3-642-40040-7|doi-access=free }}
last1=Garg|first1=Sanjam|
last2=Gentry|first2=Craig|
last3=Halevi|first3=Shai|title=Advances in Cryptology – EUROCRYPT 2013 |chapter=Candidate Multilinear Maps from Ideal Lattices |doi-access=free |via=SpringerLink |series=Lecture Notes in Computer Science |
date=2013|volume=7881 |doi=10.1007/978-3-642-38348-9_1|
pages=1–17|isbn=978-3-642-38347-2 }}
last1=Gentry|first1=Craig|
last2=Gorbunov|first2=Sergey|
last3=Halevi|first3=Shai|title=Theory of Cryptography |chapter=Graph-Induced Multilinear Maps from Lattices |series=Lecture Notes in Computer Science |
date=2015|volume=9015 |
pages=498–527|doi=10.1007/978-3-662-46497-7_20 |isbn=978-3-662-46496-0 |doi-access=free |via=SpringerLink }}
}}