Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation

被引:1
|
作者
Kuang, Randy [1 ]
Perepechaenko, Maria [1 ]
机构
[1] Quantropi Inc, 1545 Carling Ave Su 620, Ottawa, ON 189, Canada
关键词
Post-Quantum Cryptography; Public key cryptography; PQC; Key encapsulation mechanism; KEM; Multivariate polynomials; PQC performance; Hidden ring; Diophantine equation problem; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/s11128-023-04064-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Kuang et al. recently introduced a novel quantum-safe public key scheme, called the multivariate Polynomial Public Key or MPPK. MPPK is based upon the mutual inversion relationship of multiplication and division, with the former used for key pair construction, and the latter used for decryption. For key pair construction, two solvable univariate polynomials are each multiplied by a base multivariate polynomial used for the purpose of noise injection. The constant term and highest order term of the produced product polynomials with respect to the message variable are set aside and used to create two noise functions, concealed using a hidden ring. The remaining parts of the product polynomials and two noise functions constitute the public key. The operation used to create noise functions is partially homomorphic. In this paper, we propose to extend the key construction to use this partially homomorphic operator and two hidden rings to hide the public key product polynomials, one for each polynomial. In other words, we propose to encrypt the product polynomials in their entirety with a pair of hidden rings using the partially homomorphic operator. Encrypting the public key this way complicates possible attacks on the public key and forces the adversary to guess the pair of hidden rings. We name this new construction Homomorphic Polynomial Public Key over Two Hidden Rings or HPPK-THR. HPPK-THR demonstrates the IND-CPA property with uninterpretable security in secret recovery attacks, due to the modular Diophantine Equation Problem. In our brief benchmark performance, HPPK-THR outperforms MPPK KEM and NIST Round 3 finalists.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation
    Randy Kuang
    Maria Perepechaenko
    [J]. Quantum Information Processing, 22
  • [2] Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
    Kuang, Randy
    Perepechaenko, Maria
    Toth, Ryan
    Barbeau, Michel
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [3] A new quantum-safe multivariate polynomial public key digital signature algorithm
    Randy Kuang
    Maria Perepechaenko
    Michel Barbeau
    [J]. Scientific Reports, 12
  • [4] A new quantum-safe multivariate polynomial public key digital signature algorithm
    Kuang, Randy
    Perepechaenko, Maria
    Barbeau, Michel
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01) : 13168
  • [5] ESPQ: Quantum-Safe Encapsulation Security Payload
    Khorkheli, L.
    Bourne, D.
    Satrya, G. B.
    [J]. 2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 263 - 267
  • [6] A new post-quantum multivariate polynomial public key encapsulation algorithm
    Kuang, Randy
    Perepechaenko, Maria
    Barbeau, Michel
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (10)
  • [7] A new post-quantum multivariate polynomial public key encapsulation algorithm
    Randy Kuang
    Maria Perepechaenko
    Michel Barbeau
    [J]. Quantum Information Processing, 21
  • [8] Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism
    Kuang, Randy
    Perepechaenko, Maria
    Toth, Ryan
    Barbeau, Michel
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 : 239 - 255
  • [9] Transitioning Towards Quantum-Safe Government Examining Stages of Growth Models for Quantum-Safe Public Key Infrastructure Systems
    Ini, Kong
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON THEORY AND PRACTICE OF ELECTRONIC GOVERNANCE, ICEGOV 2022, 2022, : 499 - 503
  • [10] KeyShield: A Scalable and Quantum-Safe Key Management Scheme
    Al-darwbi, Mohammed Y.
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 87 - 101