Polar coding for Ring-LWE-based public key encryption

被引:1
作者
Wang, Jiabo [1 ]
Ling, Cong [2 ]
机构
[1] Nanyang Technol Univ, SCRIPTS, Singapore 637457, Singapore
[2] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2023年 / 15卷 / 02期
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会;
关键词
Ring-LWE; Polar codes; Public key encryption; Error dependency; Canonical embedding; COSET CODES;
D O I
10.1007/s12095-022-00607-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the bit-security level by using wider error distribution while keeping the target decryption failure rate achievable. The approach we proposed in this work is twofold. Firstly, we formulate RLWE public key encryption as a channel model with some noise terms known by the decoder. This makes our approach distinguished from existing research of this kind in the literature which ignores these known terms. Secondly, we design polar codes for the derived channel model. Theoretically and numerically, we show the proposed modeling and polar coding scheme contributes to a considerable bit-security level improvement compared with NewHope, a submission to National Institute of Standards and Technology (NIST), with almost the same parameters. Moreover, polar encoding and decoding support isochronous implementations in the sense that the timings of associated operations are irrelevant to the sensitive information.
引用
收藏
页码:397 / 431
页数:35
相关论文
共 50 条
[41]   On the Construction of Public Key Encryption with Sender Recovery [J].
Wei, Puwen ;
Zheng, Yuliang .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2015, 26 (01) :1-31
[42]   TFHE Public-Key Encryption Revisited [J].
Joye, Marc .
TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 :277-291
[43]   Public-Key Encryption with Lazy Parties [J].
Yasunaga, Kenji .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) :590-600
[44]   On Public Key Encryption from Noisy Codewords [J].
Ben-Sasson, Eli ;
Ben-Tov, Iddo ;
Damgard, Ivan ;
Ishai, Yuval ;
Ron-Zewi, Noga .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 :417-446
[45]   Probabilistic Public Key Encryption with Equality Test [J].
Yang, Guomin ;
Tan, Chik How ;
Huang, Qiong ;
Wong, Duncan S. .
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 :119-+
[46]   Incremental Deterministic Public-Key Encryption [J].
Mironov, Ilya ;
Pandey, Omkant ;
Reingold, Omer ;
Segev, Gil .
JOURNAL OF CRYPTOLOGY, 2018, 31 (01) :134-161
[47]   Public key encryption algorithm on braid groups [J].
Department of Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China .
Ruan Jian Xue Bao, 2007, 3 (722-729) :722-729
[48]   A New Public Key Encryption with Equality Test [J].
Huang, Kaibin ;
Tso, Raylin ;
Chen, Yu-Chi ;
Li, Wangyu ;
Sun, Hung-Min .
NETWORK AND SYSTEM SECURITY, 2014, 8792 :550-557
[49]   Incremental Deterministic Public-Key Encryption [J].
Ilya Mironov ;
Omkant Pandey ;
Omer Reingold ;
Gil Segev .
Journal of Cryptology, 2018, 31 :134-161
[50]   Public key encryption with distributed keyword search [J].
Eslami, Ziba ;
Noroozi, Mahnaz ;
Amirizirtol, Kobra .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08) :2369-2393