Pipelined High-throughput NTT Architecture for Lattice-Based Cryptography

被引:4
|
作者
Tan, Weihang [1 ]
Wang, Antian [1 ]
Lao, Yingjie [1 ]
Zhang, Xinmiao [2 ]
Parhi, Keshab K. [3 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
[3] Univ Minnesota, Dept Elect & Comp Engn, Minneapolis, MN 55455 USA
关键词
Post-quantum Cryptography; Homomorphic Encryption; Lattice-based Cryptography; Number theoretic transform; Security;
D O I
10.1109/ASIANHOST53231.2021.9699608
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lattice-based cryptography is a powerful cryptographic primitive that can achieve post-quantum security. The most computational-intensive operations in the lattice-based cryptographic schemes are the polynomial multiplications over the ring, which can be accelerated by adopting the number theoretic transform (NTT) in practical applications. This paper proposes a novel hardware accelerator for the NTT algorithm for lattice-based cryptography applications, which can achieve full utilization for all the hardware components. The key ideas involve exploiting well-designed folding sets and applying the folding transformations to adapt the fast Fourier transform (FFT) multi-path delay commutator architectures and a lightweight modular multiplier.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A compact pipelined architecture with high-throughput for context-based binary arithmetic coding
    Yu, Chu
    Hu, Hwai-Tsu
    [J]. 20TH ANNIVERSARY IEEE INTERNATIONAL SOC CONFERENCE, PROCEEDINGS, 2007, : 33 - 36
  • [22] High-throughput pipelined mergesort
    Fleming, Kermin
    King, Myron
    Ng, Man Cheuk
    Khan, Asif
    Vijayaraghavan, Muralidaran
    [J]. MEMOCODE'08: SIXTH ACM & IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR CO-DESIGN, PROCEEDINGS, 2008, : 155 - 158
  • [23] Proof of a Shuffle for Lattice-Based Cryptography
    Costa, Nuria
    Martinez, Ramiro
    Morillo, Paz
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 280 - 296
  • [24] A high-throughput pipelined architecture for blind adaptive equalization with minimum latency
    Mizuno, M
    Ueda, K
    Okello, J
    Ochi, H
    [J]. THIRTY-SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS - CONFERENCE RECORD, VOLS 1 AND 2, CONFERENCE RECORD, 2002, : 980 - 984
  • [25] A high-throughput pipelined architecture for blind adaptive equalizer with minimum latency
    Mizuno, M
    Ueda, K
    Okello, J
    Ochi, H
    [J]. 2002 45TH MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, CONFERENCE PROCEEDINGS, 2002, : 29 - 32
  • [26] Power Analysis Attacks for Lattice-Based Cryptography
    Li, Yan-Bin
    Zhu, Jia-Jie
    Tang, Ming
    Zhang, Huan-Guo
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 331 - 352
  • [27] Some Recent Progress in Lattice-Based Cryptography
    Peikert, Chris
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 72 - 72
  • [28] Preface to special topic on lattice-based cryptography
    Yu Yu
    [J]. National Science Review, 2021, 8 (09) : 6 - 6
  • [29] Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign
    Hoffstein, Jeff
    Howgrave-Graham, Nick
    Pipher, Jill
    Whyte, William
    [J]. LLL ALGORITHM: SURVEY AND APPLICATIONS, 2010, : 349 - 390
  • [30] Improvement of Lattice-Based Cryptography Using CRT
    Plantard, Thomas
    Rose, Mike
    Susilo, Willy
    [J]. QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 : 275 - 282