Multiplicative Complexity of XOR Based Regular Functions

被引:4
作者
Bernasconi, Anna [1 ]
Cimato, Stelvio [2 ]
Ciriani, Valentina [2 ]
Molteni, Maria Chiara [2 ]
机构
[1] Univ Pisa, Dept Comp Sci, I-56126 Pisa, Italy
[2] Univ Milan, Dept Comp Sci, I-20122 Milan, Italy
关键词
Complexity theory; Logic gates; Cryptography; Boolean functions; Protocols; Minimization; Inverters; Logic synthesis; multiplicative complexity; XOR-AND graphs; regular Boolean functions; BOOLEAN FUNCTION; MINIMIZATION; CIRCUITS;
D O I
10.1109/TC.2022.3141249
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
XOR-AND Graphs (XAGs) are an enrichment of the classical AND-Inverter Graphs (AIGs) with XOR nodes. In particular, XAGs are networks composed by ANDs, XORs, and inverters. Besides several emerging technologies applications, XAGs are often exploited in cryptography-related applications based on the multiplicative complexity of a Boolean function. The multiplicative complexity of a function is the minimum number of AND gates (i.e., multiplications) that are sufficient to represent the function over the basis {AND, XOR, NOT}. In fact, the minimization of the number of AND gates is important for high-level cryptography protocols such as secure multiparty computation, where processing AND gates is more expensive than processing XOR gates. Moreover, it is an indicator of the degree of vulnerability of the circuit, as a small number of AND gates corresponds to a high vulnerability to algebraic attacks. In this paper we study the multiplicative complexity of Boolean functions characterized by two particular regularities, called autosymmetry and D-reducibility. Moreover, we exploit these regularities for decreasing the number of AND nodes in XAGs. The experimental results validate the proposed approaches.
引用
收藏
页码:2927 / 2939
页数:13
相关论文
共 43 条
[1]   Ciphers for MPC and FHE [J].
Albrecht, Martin R. ;
Rechberger, Christian ;
Schneider, Thomas ;
Tiessen, Tyge ;
Zohner, Michael .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :430-454
[2]  
[Anonymous], 1991, MCNC Technical Report
[3]  
[Anonymous], 1987, The complexity of Boolean functions
[4]   Maturity and Performance of Programmable Secure Computation [J].
Archer, David W. ;
Bogdanov, Dan ;
Pinkas, Benny ;
Pullonen, Pille .
IEEE SECURITY & PRIVACY, 2016, 14 (05) :48-56
[5]   DNS-based dynamic context resolution for SCHC [J].
Bernard, Antoine ;
Balakrichenan, Sandoche ;
Marot, Michel ;
Ampeau, Benoit .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[6]   Three-level logic minimization based on function regularities [J].
Bernasconi, A ;
Ciriani, V ;
Luccio, F ;
Pagli, L .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2003, 22 (08) :1005-1016
[7]  
Bernasconi A., 2016, PROC IFIPIEEE INT C, P1
[8]   Synthesis of autosymmetric functions in a new three-level form [J].
Bernasconi, Anna ;
Ciriani, Valentina ;
Luccio, Fabrizio ;
Pagli, Linda .
THEORY OF COMPUTING SYSTEMS, 2008, 42 (04) :450-464
[9]   Exploiting Symmetrization and D-Reducibility for Approximate Logic Synthesis [J].
Bernasconi, Anna ;
Ciriani, Valentina ;
Villa, Tiziano .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) :121-133
[10]  
Bernasconi A, 2021, PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), P360, DOI 10.23919/DATE51398.2021.9474138