A public key encryption scheme based on a new variant of LWE with small cipher size

被引:2
|
作者
Wang, Ziqing [1 ]
Tang, Dianhua [1 ]
Yang, Haomiao [1 ,2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
关键词
Lattice; LWE; PKE; Ciphertext size;
D O I
10.1016/j.sysarc.2021.102165
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP. The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP. The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Sender-side Public Key Deniable Encryption Scheme Based on LWE
    Wu W.
    Zheng J.
    Feng Y.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (02): : 192 - 199
  • [2] A new public key cipher system based on image encryption
    Alam, MGR
    Hassan, MM
    Hossain, N
    Quadir, SMM
    Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 1735 - 1738
  • [3] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378
  • [4] A new construction of public key authenticated encryption with keyword search based on LWE
    Wang, Ziqing
    Li, Jin
    Liu, Xiaoguang
    Wu, Xinyan
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 86 (02) : 229 - 240
  • [5] Polar coding for Ring-LWE-based public key encryption
    Jiabo Wang
    Cong Ling
    Cryptography and Communications, 2023, 15 : 397 - 431
  • [6] Polar coding for Ring-LWE-based public key encryption
    Wang, Jiabo
    Ling, Cong
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2023, 15 (02): : 397 - 431
  • [7] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [8] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [10] A New Public Key Encryption Scheme based on Layered Cellular Automata
    Zhang, Xing
    Lu, Rongxing
    Zhang, Hong
    Xu, Chungen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3572 - 3590