Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation

被引:1
|
作者
Kuang, Randy [1 ]
Perepechaenko, Maria [1 ]
机构
[1] Quantropi Inc, 1545 Carling Ave Su 620, Ottawa, ON 189, Canada
关键词
Post-Quantum Cryptography; Public key cryptography; PQC; Key encapsulation mechanism; KEM; Multivariate polynomials; PQC performance; Hidden ring; Diophantine equation problem; DISCRETE LOGARITHMS; ALGORITHMS;
D O I
10.1007/s11128-023-04064-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Kuang et al. recently introduced a novel quantum-safe public key scheme, called the multivariate Polynomial Public Key or MPPK. MPPK is based upon the mutual inversion relationship of multiplication and division, with the former used for key pair construction, and the latter used for decryption. For key pair construction, two solvable univariate polynomials are each multiplied by a base multivariate polynomial used for the purpose of noise injection. The constant term and highest order term of the produced product polynomials with respect to the message variable are set aside and used to create two noise functions, concealed using a hidden ring. The remaining parts of the product polynomials and two noise functions constitute the public key. The operation used to create noise functions is partially homomorphic. In this paper, we propose to extend the key construction to use this partially homomorphic operator and two hidden rings to hide the public key product polynomials, one for each polynomial. In other words, we propose to encrypt the product polynomials in their entirety with a pair of hidden rings using the partially homomorphic operator. Encrypting the public key this way complicates possible attacks on the public key and forces the adversary to guess the pair of hidden rings. We name this new construction Homomorphic Polynomial Public Key over Two Hidden Rings or HPPK-THR. HPPK-THR demonstrates the IND-CPA property with uninterpretable security in secret recovery attacks, due to the modular Diophantine Equation Problem. In our brief benchmark performance, HPPK-THR outperforms MPPK KEM and NIST Round 3 finalists.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] Public key exchange using matrices over group rings
    Kahrobaei, Delaram
    Koupparis, Charalambos
    Shpilrain, Vladimir
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2013, 5 (01) : 97 - 115
  • [42] A new fully homomorphic encryption over the integers using smaller public key
    Ramaiah, Yeluripati Govindha
    Kumari, Gunta Vijaya
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 303 - 331
  • [43] Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
    Coron, Jean-Sebastien
    Naccache, David
    Tibouchi, Mehdi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 446 - 464
  • [44] Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid
    Shekhawat, Hema
    Gupta, Daya Sagar
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (07):
  • [45] Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
    Saito, Tsunekazu
    Xagawa, Keita
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 520 - 551
  • [46] Using the new VPMADD instructions for the new post quantum key encapsulation mechanism SIKE
    Gueron, Shay
    Kostic, Dusan
    [J]. 2019 IEEE 26TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH), 2019, : 215 - 218
  • [47] Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers
    Cheng, Hao
    Grossschaedl, Johann
    Ronne, Peter B.
    Ryan, Peter Y. A.
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2020, 2021, 12609 : 18 - 33
  • [48] Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model
    Jiang, Haodong
    Zhang, Zhenfeng
    Ma, Zhi
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 227 - 248
  • [49] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [50] Cryptanalysis of two sparse polynomial based public key cryptosystems
    Bao, F
    Deng, RH
    Geiselmann, W
    Schnorr, C
    Steinwandt, R
    Wu, HJ
    [J]. PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 153 - 164