. Encryption
Given a message and apublickey compute
In matrix notation this is . Remember consists of integer values, and is a lattice point, so v is also a lattice point. The ciphertext is then
Decryption
To decrypt the cyphertext one computes
The Babai rounding technique will be used to remove the term as longas it is small enough. Finally compute
to get the messagetext.
Example
Let be a lattice with the basis and its inverse
and
With
and
this gives
Let the message be and the error vector . Then the ciphertext is
.
To decrypt one must compute .
This is rounded to and the message is recovered with.
ecurity of the Scheme
1999 Nguyen showed at the Crypto conference that the GGH encryption scheme has a flaw in the design of the schemes. He showed that every ciphertext reveals information about the plaintext and that the problem of decryption could be turned in a special closest vector problem much easier to solve than the general CVP.
Bibliography
* Oded Goldreich, Shafi Goldwasser, and Shai Halevi. Public-key cryptosystems from lattice reduction problems. In CRYPTO ’97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 112–131, London, UK, 1997. Springer-Verlag.
* Phong Q. Nguyen. Cryptanalysis of the goldreich-goldwasser-halevi cryptosystem from crypto ’97. In CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pages 288–304, London, UK, 1999. Springer-Verlag.