Polar coding for Ring-LWE-based public key encryption

被引:1
作者
Wang, Jiabo [1 ]
Ling, Cong [2 ]
机构
[1] Nanyang Technol Univ, SCRIPTS, Singapore 637457, Singapore
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2023年 / 15卷 / 02期
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会;
关键词
Ring-LWE; Polar codes; Public key encryption; Error dependency; Canonical embedding; COSET CODES;
D O I
10.1007/s12095-022-00607-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the bit-security level by using wider error distribution while keeping the target decryption failure rate achievable. The approach we proposed in this work is twofold. Firstly, we formulate RLWE public key encryption as a channel model with some noise terms known by the decoder. This makes our approach distinguished from existing research of this kind in the literature which ignores these known terms. Secondly, we design polar codes for the derived channel model. Theoretically and numerically, we show the proposed modeling and polar coding scheme contributes to a considerable bit-security level improvement compared with NewHope, a submission to National Institute of Standards and Technology (NIST), with almost the same parameters. Moreover, polar encoding and decoding support isochronous implementations in the sense that the timings of associated operations are irrelevant to the sensitive information.
引用
收藏
页码:397 / 431
页数:35
相关论文
共 50 条
[31]   Public Key Encryption with Fuzzy Matching [J].
Wang, Yuanhao ;
Huang, Qiong ;
Li, Hongbo ;
Xiao, Meiyan ;
Huang, Jianye ;
Yang, Guomin .
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 :39-62
[32]   A New Public Key Encryption Scheme based on Layered Cellular Automata [J].
Zhang, Xing ;
Lu, Rongxing ;
Zhang, Hong ;
Xu, Chungen .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10) :3572-3590
[33]   Additive mixing modulation for public key encryption based on distributed dynamics [J].
Tenny, R ;
Tsimring, LS .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (03) :672-679
[34]   Design and implementation of a chaos-based public key encryption scheme [J].
Wang, XB ;
Zhang, LH ;
Wu, Y .
PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, :79-82
[35]   A Practical Public Key Encryption Scheme Based on Learning Parity With Noise [J].
Yu, Zhimin ;
Gao, Chong-Zhi ;
Jing, Zhengjun ;
Gupta, Brij Bhooshan ;
Cai, Qiuru .
IEEE ACCESS, 2018, 6 :31918-31923
[36]   Polar Coding for Secret-Key Generation [J].
Chou, Remi A. ;
Bloch, Matthieu R. ;
Abbe, Emmanuel .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) :6213-6237
[37]   Polar Coding for the Wiretap Channel With Shared Key [J].
Wang, Haowei ;
Tao, Xiaofeng ;
Li, Na ;
Han, Zhu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) :1351-1360
[38]   Practical MP-LWE-based encryption balancing security-risk versus efficiency [J].
Steinfeld, Ron ;
Sakzad, Amin ;
Zhao, Raymond K. .
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) :2847-2884
[39]   Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors [J].
Seo, Hwajeong ;
Liu, Zhe ;
Park, Taehwan ;
Kwon, Hyeokchan ;
Lee, Sokjoon ;
Kim, Howon .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 :175-188
[40]   Semi-generic construction of public key encryption and identity-based encryption with equality test [J].
Lee, Hyung Tae ;
Ling, San ;
Seo, Jae Hong ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2016, 373 :419-440