Design and Implementation of a Lattice-Based Public-Key Encryption Scheme

被引:2
|
作者
Lin, Hui [1 ]
Liu, Dongsheng [2 ]
Zhang, Cong [2 ]
Dong, Yahui [2 ]
机构
[1] Wuhan Univ Technol, Sch Sci, Wuhan 430070, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice-based cryptography; public-key size; hardware implementation; FPGA;
D O I
10.1142/S0218126618502018
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its advantage of quantum resistance and the provable security under some worst-case hardness assumptions, lattice-based cryptography is being increasingly researched. This paper tries to explore and present a novel lattice-based public key cryptography and its implementation of circuits. In this paper, the LWE (learning with error) cryptography is designed for circuit realization in a practical way. A strategy is proposed to dramatically reduce the stored public key size from m.(n + 1)2q to m.l.log 2q, with only several additional linear feedback shift registers. The circuit design is implemented on Xilinx Spartan-3A FPGA and performs very well with limited resources. Only 125 slices and 8 BRAMs are occupied, and there are no complex operation devices such as multipliers or dividers, all the involved arithmetic operations are additions. This design is smaller than most hardware implementations of LWE or Ring-LWE cryptography in current state, while having an acceptable frequency at 111 MHz. Therefore, LWE cryptography can be practically realized, and its advantages of quantum resistance and simple implementation make the public key cryptography promising for some applications in devices such as smart cards.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Lattice-based certificateless encryption scheme
    Mingming Jiang
    Yupu Hu
    Hao Lei
    Baocang Wang
    Qiqi Lai
    [J]. Frontiers of Computer Science, 2014, 8 : 828 - 836
  • [32] VLSI IMPLEMENTATION OF PUBLIC-KEY ENCRYPTION ALGORITHMS
    ORTON, GA
    ROY, MP
    SCOTT, PA
    PEPPARD, LE
    TAVARES, SE
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 277 - 301
  • [33] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [34] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    [J]. Tiedao Xuebao, 2006, 5 (95-98):
  • [35] A Lattice-Based Public Key Encryption with Equality Test in Standard Model
    Dung Hoang Duong
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Roy, Partha Sarathi
    Susilo, Willy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 138 - 155
  • [36] Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
    Behnia, Rouzbeh
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1269 - 1282
  • [37] Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles
    Amirkhanova, Dana Sairangazhykyzy
    Iavich, Maksim
    Mamyrbayev, Orken
    [J]. CRYPTOGRAPHY, 2024, 8 (03)
  • [38] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [39] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [40] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27