Programmable RNS Lattice-Based Parallel Cryptographic Decryption

被引:0
|
作者
Martins, Paulo [1 ]
Sousa, Leonel [1 ]
Eynard, Julien [2 ]
Bajard, Jean-Claude [2 ]
机构
[1] Univ Lisbon, Inst Super Tecn, INESC ID, Rua Alves Redol 9, P-1000029 Lisbon, Portugal
[2] Univ Paris 06, Sorbonne Univ, CNRS, UMR LIP6 7606, F-75005 Paris, France
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Should quantum computing become viable, current public-key cryptographic schemes will no longer be valid. Since cryptosystems take many years to mature, research on postquantum cryptography is now more important than ever. Herein, lattice-based cryptography is focused on, as an alternative postquantum cryptosystem, to improve its efficiency. We put together several theoretical developments so as to produce an efficient implementation that solves the Closest Vector Problem (CVP) on Goldreich-Goldwasser-Halevi (GGH)-like cryptosystems based on the Residue Number System (RNS). We were able to produce speed-ups of up to 5.9 and 11.2 on the GTX 780 Ti and i7 4770K devices, respectively, when compared to a single-core optimized implementation. Finally, we show that the proposed implementation is a competitive alternative to the Rivest-ShamirAdleman (RSA).
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [1] New lattice-based cryptographic constructions
    Regev, O
    JOURNAL OF THE ACM, 2004, 51 (06) : 899 - 942
  • [2] On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
    Bandara, Harshana
    Herath, Yasitha
    Weerasundara, Thushara
    Alawatugoda, Janaka
    CRYPTOGRAPHY, 2022, 6 (04)
  • [3] Analysis and Acceleration of NTRU Lattice-Based Cryptographic System
    Bai, Tianyu
    Davis, Spencer
    Li, Juanjuan
    Jiang, Hai
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 83 - 88
  • [4] Lattice-Based Programmable Hash Functions and Applications
    Zhang, Jiang
    Chen, Yu
    Zhang, Zhenfeng
    JOURNAL OF CRYPTOLOGY, 2024, 37 (01)
  • [5] An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives
    Easttom, Chuck
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 811 - 818
  • [6] Lattice-Based Programmable Hash Functions and Applications
    Jiang Zhang
    Yu Chen
    Zhenfeng Zhang
    Journal of Cryptology, 2024, 37
  • [7] A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
    Boyen, Xavier
    Haines, Thomas
    Muller, Johannes
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 336 - 356
  • [8] Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
    Bendlin, Rikke
    Damgard, Ivan
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 201 - 218
  • [9] Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
    Katsumata, Shuichi
    Matsuda, Takahiro
    Takayasu, Atsushi
    THEORETICAL COMPUTER SCIENCE, 2020, 809 : 103 - 136
  • [10] CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
    Nejatollahi, Hamid
    Gupta, Saransh
    Imani, Mohsen
    Rosing, Tajana Simunic
    Cammarota, Rosario
    Dutt, Nikil
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,