The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures

被引:8
|
作者
Aysu, Aydin [1 ]
Yuce, Bilgiday [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
基金
美国国家科学基金会;
关键词
Design; Algorithms; Performance; Hardware/software codesign; lattice-based cryptography; digital signatures; FPGA; MULTIPLICATION; CRYPTOSYSTEMS;
D O I
10.1145/2724714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing have spurred a significant amount of research into public-key cryptographic algorithms that are resistant against postquantum cryptanalysis. Lattice-based cryptography is one of the important candidates because of its reasonable complexity combined with reasonable signature sizes. However, in a postquantum world, not only the cryptography will change but also the computing platforms. Large amounts of resource-constrained embedded systems will connect to a cloud of powerful server computers. We present an optimization technique for lattice-based signature generation on such embedded systems; our goal is to optimize latency rather than throughput. Indeed, on an embedded system, the latency of a single signature for user identification or message authentication is more important than the aggregate signature generation rate. We build a high-performance implementation using hardware/software codesign techniques. The key idea is to partition the signature generation scheme into offline and online phases. The signature scheme allows this separation because a large portion of the computation does not depend on the message to be signed and can be handled before the message is given. Then, we can map complex precomputation operations in software on a low-cost processor and utilize hardware resources to accelerate simpler online operations. To find the optimum hardware architecture for the target platform, we define and explore the design space and implement two design configurations. We realize our solutions on the Altera Cyclone-IV CGX150 FPGA. The implementation consists of a NIOS soft-core processor and a low-latency hash and polynomial multiplication engine. On average, the proposed low-latency architecture can generate a signature with a latency of 96 clock cycles at 40MHz, resulting in a response time of 2.4 mu s for a signing request. On equivalent platforms, this corresponds to a performance improvement of 33 and 105 times compared to previous hardware and software implementations, respectively.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Lattice-based digital signatures
    Lyubashevsky, Vadim
    NATIONAL SCIENCE REVIEW, 2021, 8 (09)
  • [2] Lattice-based digital signatures
    Vadim Lyubashevsky
    National Science Review, 2021, 8 (09) : 9 - 10
  • [3] Asymptotically efficient lattice-based digital signatures
    Lyubashevsky, Vadim
    Micciancio, Daniele
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 37 - 54
  • [4] Asymptotically Efficient Lattice-Based Digital Signatures
    Lyubashevsky, Vadim
    Micciancio, Daniele
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 774 - 797
  • [5] Asymptotically Efficient Lattice-Based Digital Signatures
    Vadim Lyubashevsky
    Daniele Micciancio
    Journal of Cryptology, 2018, 31 : 774 - 797
  • [6] A Latency-Optimized Hash-Based Digital Signature Accelerator for the Tactile Internet
    Pauls, Friedrich
    Wittig, Robert
    Fettweis, Gerhard
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 93 - 106
  • [7] Lattice-based group signatures with forward security for anonymous authentication
    Chen, Simin
    Chen, Jiageng
    HELIYON, 2023, 9 (04)
  • [8] A lattice-based approach for updating access control policies in real-time
    Xin, Tai
    Ray, Indrakshi
    INFORMATION SYSTEMS, 2007, 32 (05) : 755 - 772
  • [9] Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices
    Oder, Tobias
    Poeppelmann, Thomas
    Gueneysu, Tim
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [10] On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage
    Liu, Yuejun
    Zhou, Yongbin
    Sun, Shuo
    Wang, Tianyu
    Zhang, Rui
    Ming, Jingdian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1868 - 1879