Polar coding for Ring-LWE-based public key encryption

被引:1
作者
Wang, Jiabo [1 ]
Ling, Cong [2 ]
机构
[1] Nanyang Technol Univ, SCRIPTS, Singapore 637457, Singapore
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2023年 / 15卷 / 02期
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会;
关键词
Ring-LWE; Polar codes; Public key encryption; Error dependency; Canonical embedding; COSET CODES;
D O I
10.1007/s12095-022-00607-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the bit-security level by using wider error distribution while keeping the target decryption failure rate achievable. The approach we proposed in this work is twofold. Firstly, we formulate RLWE public key encryption as a channel model with some noise terms known by the decoder. This makes our approach distinguished from existing research of this kind in the literature which ignores these known terms. Secondly, we design polar codes for the derived channel model. Theoretically and numerically, we show the proposed modeling and polar coding scheme contributes to a considerable bit-security level improvement compared with NewHope, a submission to National Institute of Standards and Technology (NIST), with almost the same parameters. Moreover, polar encoding and decoding support isochronous implementations in the sense that the timings of associated operations are irrelevant to the sensitive information.
引用
收藏
页码:397 / 431
页数:35
相关论文
共 50 条
[21]   A Public Key Encryption Based on Third Order Linear Sequences [J].
El Fadil, L. .
2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, :500-504
[22]   Public key encryption with searchable keywords based on Jacobi symbols [J].
Di Crescenzo, Giovanni ;
Saraswat, Vishal .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 :282-296
[23]   Cryptanalysis of the public-key encryption based on braid groups [J].
Lee, E ;
Park, JH .
ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 :477-490
[24]   A fast semiring-based public-key encryption [J].
Nassr, Dieaa I. ;
Bahig, Hatem M. ;
Hazber, Mohamed A. G. ;
Alseadoon, Ibrahim M. ;
Bahig, Hazem M. .
AIMS MATHEMATICS, 2025, 10 (04) :8569-8586
[25]   An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms [J].
Nguyen, Tuy Tan ;
Nguyen, Tram Thi Bao ;
Lee, Hanho .
ELECTRONICS, 2022, 11 (06)
[26]   HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption [J].
Saarinen, Markku-Juhani O. .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 :192-212
[27]   A Posteriori Openable Public Key Encryption [J].
Bultel, Xavier ;
Lafourcade, Pascal .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :17-31
[28]   A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding [J].
Kim, Young-Sik ;
Kim, Jong-Hwan ;
Kim, Sang-Hyo .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) :937-940
[29]   Ideal Public Key Encryption, Revisited [J].
Cheng, Yao ;
Lu, Xianhui ;
Li, Ziyi .
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT I, 2025, 14903 :148-167
[30]   Multipurpose Public-Key Encryption [J].
Zhang, Rui ;
He, Kai .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 :69-84