Programmable RNS Lattice-Based Parallel Cryptographic Decryption

被引:0
|
作者
Martins, Paulo [1 ]
Sousa, Leonel [1 ]
Eynard, Julien [2 ]
Bajard, Jean-Claude [2 ]
机构
[1] Univ Lisbon, Inst Super Tecn, INESC ID, Rua Alves Redol 9, P-1000029 Lisbon, Portugal
[2] Univ Paris 06, Sorbonne Univ, CNRS, UMR LIP6 7606, F-75005 Paris, France
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Should quantum computing become viable, current public-key cryptographic schemes will no longer be valid. Since cryptosystems take many years to mature, research on postquantum cryptography is now more important than ever. Herein, lattice-based cryptography is focused on, as an alternative postquantum cryptosystem, to improve its efficiency. We put together several theoretical developments so as to produce an efficient implementation that solves the Closest Vector Problem (CVP) on Goldreich-Goldwasser-Halevi (GGH)-like cryptosystems based on the Residue Number System (RNS). We were able to produce speed-ups of up to 5.9 and 11.2 on the GTX 780 Ti and i7 4770K devices, respectively, when compared to a single-core optimized implementation. Finally, we show that the proposed implementation is a competitive alternative to the Rivest-ShamirAdleman (RSA).
引用
收藏
页码:149 / 153
页数:5
相关论文
共 50 条
  • [21] Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components
    Valencia, Felipe
    Polian, Ilia
    Regazzoni, Francesco
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 107 - 123
  • [22] RNS Arithmetic Approach in Lattice-based Cryptography Accelerating the "Rounding-off" Core Procedure
    Bajard, Jean-Claude
    Eynard, Julien
    Merkiche, Nabil
    Plantard, Thomas
    IEEE 22ND SYMPOSIUM ON COMPUTER ARITHMETIC ARITH 22, 2015, : 113 - 120
  • [23] A Hierarchical Parallel Discrete Gaussian Sampler for Lattice-Based Cryptography
    Shen, Sirui
    Song, Wenqing
    Wang, Xinyu
    Shao, Xinyu
    Fu, Yuxiang
    Lu, Zhonghai
    Li, Li
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1729 - 1733
  • [24] Babai Round-Off CVP method in RNS Application to Lattice based cryptographic protocols
    Bajard, Jean-Claude
    Eynard, Julien
    Merkiche, Nabil
    Plantard, Thomas
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 440 - 443
  • [25] GALACTICS: Gaussian Sampling for Lattice-Based Constant Time Implementation of Cryptographic Signatures, Revisited
    Barthe, Gilles
    Belaid, Sonia
    Espitau, Thomas
    Fouque, Pierre-Alain
    Rossi, Melissa
    Tibouchi, Mehdi
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2147 - 2164
  • [26] An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
    Imran, Malik
    Abideen, Zain Ul
    Pagliarini, Samuel
    ELECTRONICS, 2020, 9 (11) : 1 - 26
  • [27] Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
    Takayasu, Atsushi
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 849 : 64 - 98
  • [28] Lattice-based cryptography
    Regev, Oded
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [29] Lattice-based sums
    El-Zekey, Moataz
    Medina, Jesus
    Mesiar, Radko
    INFORMATION SCIENCES, 2013, 223 : 270 - 284
  • [30] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467