Polar coding for Ring-LWE-based public key encryption

被引:1
|
作者
Wang, Jiabo [1 ]
Ling, Cong [2 ]
机构
[1] Nanyang Technol Univ, SCRIPTS, Singapore 637457, Singapore
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2023年 / 15卷 / 02期
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会;
关键词
Ring-LWE; Polar codes; Public key encryption; Error dependency; Canonical embedding; COSET CODES;
D O I
10.1007/s12095-022-00607-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the bit-security level by using wider error distribution while keeping the target decryption failure rate achievable. The approach we proposed in this work is twofold. Firstly, we formulate RLWE public key encryption as a channel model with some noise terms known by the decoder. This makes our approach distinguished from existing research of this kind in the literature which ignores these known terms. Secondly, we design polar codes for the derived channel model. Theoretically and numerically, we show the proposed modeling and polar coding scheme contributes to a considerable bit-security level improvement compared with NewHope, a submission to National Institute of Standards and Technology (NIST), with almost the same parameters. Moreover, polar encoding and decoding support isochronous implementations in the sense that the timings of associated operations are irrelevant to the sensitive information.
引用
收藏
页码:397 / 431
页数:35
相关论文
共 50 条
  • [1] Polar coding for Ring-LWE-based public key encryption
    Jiabo Wang
    Cong Ling
    Cryptography and Communications, 2023, 15 : 397 - 431
  • [2] How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
    Wang, Jiabo
    Ling, Cong
    ENTROPY, 2021, 23 (08)
  • [3] CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
    Boura, Christina
    Gama, Nicolas
    Georgieva, Mariya
    Jetchev, Dimitar
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 316 - 338
  • [4] Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber
    Papadopoulos, Iason
    Wang, Jiabo
    CRYPTOGRAPHY, 2023, 7 (01)
  • [5] Sender-side Public Key Deniable Encryption Scheme Based on LWE
    Wu W.
    Zheng J.
    Feng Y.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (02): : 192 - 199
  • [6] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378
  • [7] Klepto for Ring-LWE Encryption
    Xiao, Dianyan
    Yu, Yang
    COMPUTER JOURNAL, 2018, 61 (08): : 1228 - 1239
  • [8] Ring-LWE Based Face Encryption and Decryption System on a GPU
    Tan, Tuy Nguyen
    Hyun, Yujin
    Kim, Jisu
    Choi, Dongwoo
    Lee, Hanho
    2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2019, : 15 - 16
  • [9] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [10] A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
    Song, Xinxia
    Chen, Zhigang
    Chen, Liang
    IEEE ACCESS, 2019, 7 : 50588 - 50594