Algorithms for the Generalized NTRU Equations and their Storage Analysis

被引:0
|
作者
Cho, Gook Hwa [1 ]
Lim, Seongan [1 ]
Lee, Hyang-Sook [2 ]
机构
[1] Ewha Womans Univ, Inst Math Sci, Seoul, South Korea
[2] Ewha Womans Univ, Dept Math, Seoul, South Korea
关键词
NTRU; LATTE; hierarchical identity-based encryption;
D O I
10.3233/FI-2020-1982
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In LATTE, a lattice based hierarchical identity-based encryption (HIBE) scheme, each hierarchical level user delegates a trapdoor basis to the next level by solving a generalized NTRU equation of level l >= 3. For l = 2, Howgrave-Graham, Pipher, Silverman, and Whyte presented an algorithm using resultant and Pornin and Prest presented an algorithm using a field norm with complexity analysis. Even though their ideas of solving NTRU equations can be conceptually extended for l >= 3, no explicit algorithmic extensions with the storage analysis are known so far. In this paper, we interpret the generalized NTRU equation as the determinant of a matrix. By using the mathematical properties of the determinant, we show that how to construct algorithms for solving the generalized NTRU equation either using resultant or a field norm for any l >= 3. We also obtain an upper bound of the size of solutions by using the properties of the determinant. From our analysis, the storage requirement of the algorithm using resultant is O(l(2)n(2) log B) and that of the algorithm using a field norm is O(l(2)n log B), where B is an upper bound of the coefficients of the input polynomials of the generalized NTRU equations. We present examples of our algorithms for l = 3 and the average storage requirements for l = 3, 4.
引用
收藏
页码:115 / 139
页数:25
相关论文
共 50 条
  • [1] Generalized NTRU Algorithms on Algebraic Rings
    Wu, Qinghao
    Zhang, Juan
    Li, Zichen
    ELECTRONICS, 2024, 13 (21)
  • [2] Morden Attacks Analysis for NTRU-Similar Algorithms
    Gorbenko, Yurii
    Akolzina, Olha
    Podhaiko, Vladyslav
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 338 - 341
  • [3] Comparative Analysis of RSA and NTRU Algorithms and Implementation in the Cloud
    Harjito, Bambang
    Tyas, Henny Nurcahyaning
    Suryani, Esti
    Wardani, Dewi Wisnu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 157 - 164
  • [4] Analysis of generalized Grover quantum search algorithms using recursion equations
    Biham, E
    Biham, O
    Biron, D
    Grassl, M
    Lidar, DA
    Shapira, D
    PHYSICAL REVIEW A, 2001, 63 (01) : 012310 - 012311
  • [5] Performance analysis of NTRU algorithm with non-post-quantum algorithms
    Abouaroek, Musaeed
    Ahmad, Khaleel
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05): : 1349 - 1363
  • [6] Signing and verifying Certificates by NTRU and RSA algorithms
    Elbasheer, Majda Omer
    Mohammed, Tarig
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 225 - 228
  • [7] The Impact of Quantum Search Algorithms on NTRU Cryptosystem
    Jun Yao Guihua Zeng Fuchen Zhu Department of Electronic Engineering Shanghai Jiaotong University
    Shanghai
    National Laboratory for Modern Communications
    Chengdu)
    信息安全与通信保密, 2005, (07) : 175 - 181
  • [8] Parallel algorithms for the Cholesky factor of generalized Lyapunov equations
    Guerrero, D
    Hernández, V
    Román, JE
    Vidal, AM
    ALGORITHMS AND ARCHITECTURES FOR REAL-TIME CONTROL 1998 (AARTC'98), 1998, : 201 - 206
  • [9] Algorithms for Solving Nonhomogeneous Generalized Sylvester Matrix Equations
    El-Sayed, Ehab A.
    El Behady, Eid E.
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [10] Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificate
    Harjito, Bambang
    Setyawati, Tri
    Wijayanto, Ardhi
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (09) : 729 - 739