Quantum-Safe HIBE: Does It Cost a Latte?

被引:0
|
作者
Zhao, Raymond K. [1 ,2 ]
Mccarthy, Sarah [3 ]
Steinfeld, Ron [1 ]
Sakzad, Amin [1 ]
O'Neill, Maire [4 ]
机构
[1] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[2] CSIROs, Data61, Marsfield, NSW 2122, Australia
[3] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[4] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast BT3 9DT, North Ireland
基金
澳大利亚研究理事会;
关键词
Lattices; Cryptography; Standards; Matrix decomposition; Encryption; Quantum computing; Public key; Lattice-based cryptography; hierarchical identity-based encryption; advanced primitives; software design; post-quantum; IDENTITY-BASED ENCRYPTION; BONSAI TREES; DELEGATE;
D O I
10.1109/TIFS.2023.3347880
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The United Kingdom (UK) government is considering advanced primitives such as identity-based encryption (IBE) for adoption as they transition their public-safety communications network from TETRA to an LTE-based service. However, the current LTE standard relies on elliptic-curve-based IBE, which will be vulnerable to quantum computing attacks, expected within the next 20-30 years. Lattices can provide quantum-safe alternatives for IBE. These schemes have shown promising results in terms of practicality. To date, several IBE schemes over lattices have been proposed, but there has been little in the way of practical evaluation. This paper provides the first complete optimised practical implementation and benchmarking of Latte, a promising Hierarchical IBE (HIBE) scheme proposed by the UK National Cyber Security Centre (NCSC) in 2017 and endorsed by European Telecommunications Standards Institute (ETSI). We propose optimisations for the KeyGen, Delegate, Extract and Gaussian sampling components of Latte, to increase attack costs, reduce decryption key lengths by 2x-3x, ciphertext sizes by up to 33%, and improve speed. In addition, we conduct a precision analysis, bounding the Renyi divergence of the distribution of the real Gaussian sampling procedures from the ideal distribution in corroboration of our claimed security levels. Our resulting implementation of the Delegate function takes 0.4 seconds at 80-bit security level on a desktop machine at 4.2GHz, significantly faster than the order of minutes estimated in the ETSI technical report. Furthermore, our optimised Latte Encrypt/Decrypt implementation reaches speeds up to 9.7x faster than the ETSI implementation.
引用
收藏
页码:2680 / 2695
页数:16
相关论文
共 50 条
  • [21] SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
    Dolev, Shlomi
    Wang, Ziyu
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 247 - 256
  • [22] Quantum-safe cryptography:crossroads of coding theory and cryptography
    Jiabo WANG
    Ling LIU
    Shanxiang LYU
    Zheng WANG
    Mengfan ZHENG
    Fuchun LIN
    Zhao CHEN
    Liuguo YIN
    Xiaofu WU
    Cong LING
    ScienceChina(InformationSciences), 2022, 65 (01) : 95 - 115
  • [23] Quantum-safe cryptography: crossroads of coding theory and cryptography
    Wang, Jiabo
    Liu, Ling
    Lyu, Shanxiang
    Wang, Zheng
    Zheng, Mengfan
    Lin, Fuchun
    Chen, Zhao
    Yin, Liuguo
    Wu, Xiaofu
    Ling, Cong
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [24] A Quantum-Safe User Authentication Protocol for the Internet of Things
    Roy, Kumar Sekhar
    Kalita, Hemanta Kumar
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2019, 10 (03): : 178 - 192
  • [25] KeyShield: A Scalable and Quantum-Safe Key Management Scheme
    Al-darwbi, Mohammed Y.
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 87 - 101
  • [26] A Generic IoT Quantum-Safe Watchdog Timer Protocol
    Eckel, Michael
    Gutsche, Tanja
    Lauer, Hagen
    Rein, Andre
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [27] No Sum (NS) Sequence: A Tool for Quantum-Safe Cryptography
    Rawal, Bharat S.
    Biswas, Anjan
    Singh, Raman
    CONTEMPORARY MATHEMATICS, 2024, 5 (03): : 4095 - 4114
  • [28] Quantum-safe cryptography: crossroads of coding theory and cryptography
    Jiabo Wang
    Ling Liu
    Shanxiang Lyu
    Zheng Wang
    Mengfan Zheng
    Fuchun Lin
    Zhao Chen
    Liuguo Yin
    Xiaofu Wu
    Cong Ling
    Science China Information Sciences, 2022, 65
  • [29] A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems
    Lizama-Perez, Luis Adrian
    CRYPTOGRAPHY, 2024, 8 (04)
  • [30] Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies
    Alupotha, Jayamine
    Boyen, Xavier
    Mckague, Matthew
    IEEE ACCESS, 2022, 10 : 17722 - 17747