An efficient and light weight polynomial multiplication for ideal lattice-based cryptography

被引:9
|
作者
Yadav, Vijay Kumar [1 ]
Verma, Shekhar [1 ]
Venkatesan, S. [1 ]
机构
[1] Indian Inst Informat Technol Allahabad Devghat, Allahabad 211015, UP, India
关键词
Fast fourier transform; Discrete cosine transformation; Number theoretic transform; Lattice-based cryptography; Ring-learning with errors; FAST FOURIER-TRANSFORM; SYMMETRIC CONVOLUTION; DISCRETE; ALGORITHM; SCHEME;
D O I
10.1007/s11042-020-09706-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ring-Learning With Errors (Ring-LWE) based cryptographic schemes such as signature, key exchange, and encryption require polynomial multiplication. This multiplication operation is the most time consuming and computationally rigorous process in Ring-LWE. In order to improve the efficiency of the Ring-LWE based schemes, most of the existing schemes use Fast Fourier Transform (FFT) based polynomial multiplication algorithm. It is known that Discrete Sine Transformation (DST) and Discrete Cosine Transformation (DCT) are faster than the FFT. The combination of DCT and DST is Discrete Trigonometric Transform (DTT). When we generalize DTT in terms of FFT form, it becomes Generalized Discrete Fourier Transform (GDFT). In this paper, we propose two new polynomial multiplication techniques using DTT and GDFT. When we applycircular convolutionandskew-circular convolutionon DTT or GDFT for the polynomial multiplication, it gives us wrong results. To overcome this issue, we usesymmetric convolutionoperation on DTT and GDFT. We implemented and compared the proposed polynomial multiplication schemes with the current state-of-the-art schemes in terms of computation and communication costs. The implementation results show that the proposed schemes DTT and GDFT perform more efficiently as compared to current state-of-the-art schemes in terms of computation and communication costs.
引用
收藏
页码:3089 / 3120
页数:32
相关论文
共 50 条
  • [1] An efficient and light weight polynomial multiplication for ideal lattice-based cryptography
    Vijay Kumar Yadav
    Shekhar Verma
    S. Venkatesan
    Multimedia Tools and Applications, 2021, 80 : 3089 - 3120
  • [2] Towards Efficient Polynomial Multiplication for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1178 - 1181
  • [3] The implementation of polynomial multiplication for lattice-based cryptography: A survey
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Peng, Cong
    Luo, Min
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [4] Efficient implementation of ideal lattice-based cryptography
    Pöppelmann T.
    IT - Information Technology, 2017, 59 (06): : 305 - 309
  • [5] Sparse polynomial multiplication for lattice-based cryptography with small complexity
    Sedat Akleylek
    Erdem Alkım
    Zaliha Yüce Tok
    The Journal of Supercomputing, 2016, 72 : 438 - 450
  • [6] Sparse polynomial multiplication for lattice-based cryptography with small complexity
    Akleylek, Sedat
    Alkim, Erdem
    Tok, Zaliha Yuce
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (02): : 438 - 450
  • [7] Optimized Schoolbook Polynomial Multiplication for Compact Lattice-Based Cryptography on FPGA
    Liu, Weiqiang
    Fan, Sailong
    Khalid, Ayesha
    Rafferty, Ciara
    O'Neill, Maire
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (10) : 2459 - 2463
  • [8] Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
    Akleylek, Sedat
    Tok, Zaliha Yuce
    IEICE ELECTRONICS EXPRESS, 2014, 11 (22):
  • [9] Reconfigurable Polynomial Multiplication Architecture for Lattice-based Post-quantum Cryptography Algorithms
    Chen T.
    Li H.
    Li W.
    Nan L.
    Du Y.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3380 - 3392
  • [10] Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor
    Park, Taehwan
    Seo, Hwajeong
    Kim, Junsub
    Park, Haeryong
    Kim, Howon
    SECURITY AND COMMUNICATION NETWORKS, 2018,