A public key encryption scheme based on a new variant of LWE with small cipher size

被引:2
|
作者
Wang, Ziqing [1 ]
Tang, Dianhua [1 ]
Yang, Haomiao [1 ,2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
关键词
Lattice; LWE; PKE; Ciphertext size;
D O I
10.1016/j.sysarc.2021.102165
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP. The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP. The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have attracted the interest of many researchers. In lattice-based cryptography, Learning With Errors (LWE) problem is a hard problem usually used to construct PKE scheme. To ensure the correctness of decryption, LWE-based schemes have a large ciphertext size. This makes these encryption schemes not practical enough when the communication bandwidth is limited. We propose a new variant of LWE, named Learning With Modulus (LWM) and prove that the new problem can be reduced from LWE problem. The proof idea of our reduction is similar to the reduction of LWR problem. We also construct a new PKE scheme based on the proposed LWM and LWE, which has small ciphertext size. For a 128 bits plaintext, the ciphertext size of our scheme is 53.57% of Lindner-Peikert's (LP) scheme under the same security level. We use python to test the performance of our scheme. The results show that our scheme is only about 0.015 ms slower than LP in the decryption. The performance of our scheme for generating keys and encrypting messages is similar to LP.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
    Bai Jian
    Yang Yatao
    Li Zichen
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 355 - 358
  • [22] On the security of a Williams based public key encryption scheme
    Mülller, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 1 - 18
  • [23] Public key searchable encryption scheme based on blockchain
    Du R.
    Tan A.
    Tian J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 114 - 122
  • [24] A Public Key Encryption Scheme Based on Idempotent Semirings
    Durcheva, Mariana
    Rachev, Martin
    41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
  • [25] A Public Key Encryption Scheme Based on Compressed Sensing
    Zhen, Liu
    2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 20 - 24
  • [26] Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps
    Essaid, M.
    Akharraz, I
    Saaidi, A.
    Mouhib, A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 173 - 187
  • [27] Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
    Kraitsberg, Michael
    Lindell, Yehuda
    Osheter, Valery
    Smart, Nigel P.
    Alaoui, Younes Talibi
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 192 - 210
  • [28] Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption
    Xiao, Dianyan
    Yu, Yang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [29] New certificateless public key encryption scheme without pairing
    Yan, Xiaopeng
    Gong, Peng
    Bai, Zhiquan
    Wang, Jiantao
    Li, Ping
    IET INFORMATION SECURITY, 2013, 7 (04) : 271 - 276
  • [30] Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
    Wen, Heping
    Lin, Yiting
    Yang, Lincheng
    Chen, Ruiting
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 250