Pipelined High-throughput NTT Architecture for Lattice-Based Cryptography

被引:4
|
作者
Tan, Weihang [1 ]
Wang, Antian [1 ]
Lao, Yingjie [1 ]
Zhang, Xinmiao [2 ]
Parhi, Keshab K. [3 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
[3] Univ Minnesota, Dept Elect & Comp Engn, Minneapolis, MN 55455 USA
关键词
Post-quantum Cryptography; Homomorphic Encryption; Lattice-based Cryptography; Number theoretic transform; Security;
D O I
10.1109/ASIANHOST53231.2021.9699608
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lattice-based cryptography is a powerful cryptographic primitive that can achieve post-quantum security. The most computational-intensive operations in the lattice-based cryptographic schemes are the polynomial multiplications over the ring, which can be accelerated by adopting the number theoretic transform (NTT) in practical applications. This paper proposes a novel hardware accelerator for the NTT algorithm for lattice-based cryptography applications, which can achieve full utilization for all the hardware components. The key ideas involve exploiting well-designed folding sets and applying the folding transformations to adapt the fast Fourier transform (FFT) multi-path delay commutator architectures and a lightweight modular multiplier.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Combined Fault and DPA Protection for Lattice-Based Cryptography
    Heinz, Daniel
    Poeppelmann, Thomas
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (04) : 1055 - 1066
  • [42] TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
    Wan, Lipeng
    Zheng, Fangyu
    Li, Jingqiang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 249 - 269
  • [43] Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
    Oder, Tobias
    Gueneysu, Tim
    Valencia, Felipe
    Khalid, Ayesha
    O'Neill, Maire
    Regazzoni, Francesco
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2016,
  • [44] Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    [J]. 2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 75 - 79
  • [45] Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -
    Khalid, Ayesha
    Oder, Tobias
    Valencia, Felipe
    Neill, Maire O'
    Gueneysu, Tim
    Regazzoni, Francesco
    [J]. PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 365 - 370
  • [46] The implementation of polynomial multiplication for lattice-based cryptography: A survey
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Peng, Cong
    Luo, Min
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [47] Computational Differential Privacy from Lattice-Based Cryptography
    Valovich, Filipp
    Alda, Francesco
    [J]. NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 121 - 141
  • [48] On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Rafferty, Ciara
    Regazzoni, Francesco
    O'Neill, Maire
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 322 - 334
  • [49] High Throughput Lattice-Based Signatures on GPUs: Comparing Falcon and Mitaka
    Lee, Wai-Kong
    Zhao, Raymond K.
    Steinfeld, Ron
    Sakzad, Amin
    Hwang, Seong Oun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 35 (04) : 675 - 692
  • [50] High-Performance Software Implementation of Discrete Gaussian Sampling for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    [J]. 2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2016, : 220 - 224