Overview
Syllabus
Intro
The "Two Faces" of lattice reduction [NS01]
Lattice reduction is a cryptanalytic bottleneck
Example: Gentry-Halevi FHE [GH11]
LLL reduction finds a good basis
Fast lattice reduction strategies
Towards faster lattice reduction [KEF21]
Lattice basis compression [SMSV14]
Lattice reduction with iterated compression
Is our algorithm numerically stable?
Is our algorithm fast?
Implementation - flatter
Experiment: q-ary lattices
Experiment: Gentry-Halevi FHE [GH11]
Experiment: RSA partial factorization [How01]
Further applications
Why Schnorr signatures?
What are threshold signatures?
Why multi-party Schnorr signatures? Why
Main Goals
2-Round Threshold Scheme
Concurrent Security: ROS Attacks NKDMOS
Recent Schnorr Threshold Signatures
Concurrent Adaptive Security
Adaptive Security is Challenging
Sparkle
Adaptive Security under (A)OMDL
Key Takeaways
Taught by
TheIACR