Better Security Estimates for Approximate, IoT-Friendly R-LWE Cryptosystems

被引:0
|
作者
O'Connor, Ruth [1 ]
Khalid, Ayesha [1 ]
O'Neill, M. [1 ]
Liu, Weiqiang [2 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
[2] Nanjing Univ Aeronaut & Astronaut, Nanjing, Peoples R China
基金
英国工程与自然科学研究理事会;
关键词
lattice-based cryptography; approximate computing; post-quantum cryptography (PQC); IoT security; light-weight cryptography;
D O I
10.1109/APCCAS55924.2022.10090405
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work explores the effect of approximation on the Ring-learning with errors (R-LWE) based public-key cryptography (PKE) systems. Lattice-based problems such as LWE have proven to be a viable alternative to the currently used PKE systems in a post-quantum world, with one such scheme taken up for standardisation in NIST's post-quantum cryptography standardisation process (CRYSTALS-Kyber). In the modern world, the Internet of Things (IoT) applications and devices have become ubiquitous. Often, they are not secure, and with the threat of quantum computing looming on the horizon, R-LWE could provide a solution. R-LWE-based schemes come at a higher computational cost, making them challenging to be implemented on IoT devices that require low energy, low area, and efficient cryptography. To enable this, approximation could aid in lowering the necessary power and memory by removing some of the complexity in R-LWE scheme. This work provides improved security estimates for an earlier presented approximate R-LWE scheme (AxRLWE), that explores the approximation via truncation of the Gaussian distribution samples values and using an approximate modular multiplier. In addition, this work calculates an effective failure rate for different truncation levels of 2 typical medium level R-LWE parameter sets and concludes a truncation of 2-bits to be the best balance between security and approximation.
引用
收藏
页码:611 / 615
页数:5
相关论文
共 6 条
  • [1] Polynomial Multiplication Architecture with Integrated Modular Reduction for R-LWE Cryptosystems
    Xinmiao Zhang
    Zheang Huai
    Keshab K. Parhi
    Journal of Signal Processing Systems, 2022, 94 : 799 - 809
  • [2] Polynomial Multiplication Architecture with Integrated Modular Reduction for R-LWE Cryptosystems
    Zhang, Xinmiao
    Huai, Zheang
    Parhi, Keshab K.
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2022, 94 (08): : 799 - 809
  • [3] REDUCED-COMPLEXITY MODULAR POLYNOMIAL MULTIPLICATION FOR R-LWE CRYPTOSYSTEMS
    Zhang, Xinmiao
    Parhi, Keshab K.
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 7853 - 7857
  • [4] Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
    Yang, Lin
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [5] RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
    Lin Yang
    EURASIP Journal on Information Security, 2024
  • [6] AxMM: Area and Power Efficient Approximate Modular Multiplier for R-LWE Cryptosystem (Invited Paper)
    Kundi, Dur E. Shahwar
    Bian, Song
    Khalid, Ayesha
    Wang, Chenghua
    O'Neill, Maire
    Liu, Weiqiang
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,