Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem

被引:30
作者
Chervyakov, N. I. [1 ]
Molahosseini, A. S. [2 ]
Lyakhov, P. A. [1 ]
Babenko, M. G. [1 ]
Deryabin, M. A. [1 ]
机构
[1] North Caucasian Fed Univ, Dept Appl Math & Math Modelling, Stavropol, Russia
[2] Islamic Azad Univ, Kerman Branch, Dept Comp Engn, Kerman, Iran
关键词
Computer arithmetic; residue number systems; chinese remainder theorem; residue-to-binary converter; residue arithmetic; 65Y04; 65Y05; 65Y20; 65Y10; DESIGN; IMPLEMENTATION; CONVERTER; NUMBERS; ADDERS; POWER;
D O I
10.1080/00207160.2016.1247439
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The residue number system (RNS) is an unconventional number system which can lead to parallel and fault-tolerant arithmetic operations. However, the complexity of residue-to-binary conversion for large number of moduli reduces the overall RNS performance, and makes it inefficient for nowadays high-performance computation systems. In this paper, we present an improved approximate Chinese remainder theorem (CRT) with the aim of performing efficient residue-to-binary conversion for general RNS moduli sets. To achieve this aim, the required number of fraction bits for accurate residue-to-binary conversion is derived. Besides, a method is proposed to substitute fractional calculations by similar computations based on integer numbers to have a hardware amenable algorithm. The proposed approach results in high-speed and low-area residue-to-binary converters for general RNS moduli sets. Therefore, with this conversion method, high dynamic range residue number systems suitable for cryptography and digital signal processing can be designed.
引用
收藏
页码:1833 / 1849
页数:17
相关论文
共 50 条
[41]   A proactive secret sharing scheme based on Chinese remainder theorem [J].
Keju Meng ;
Fuyou Miao ;
Yu Ning ;
Wenchao Huang ;
Yan Xiong ;
Chin-Chen Chang .
Frontiers of Computer Science, 2021, 15
[42]   Method based on Chinese remainder theorem for range estimation of the target [J].
Cao C. ;
Zhao Y. ;
Pang X. ;
Xu B. ;
Chen S. .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (12) :2717-2722
[43]   Digital Audio Watermark Sharing Based on the Chinese Remainder Theorem [J].
Shen, Jun-wei ;
Pan, Feng ;
Guo, Yao .
2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, :572-576
[44]   A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem [J].
Kaya, Kamer ;
Selcuk, Ali Aydin .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 :414-425
[45]   An Improved Method for Database Encryption Based on the Chinese Remainder Theorem [J].
Dai Guoyong ;
Chen Qingzhang ;
Xia Ming .
ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, :588-590
[46]   Chinese Remainder Theorem Based DTN Group Key Management [J].
Xu, Guoyu ;
Chen, Xingyuan ;
Du, Xuehui .
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, :779-783
[47]   A parallel residue-to-binary converter for the moduli set {2m-1,220m+1,221m+1, ..., 22km+1} [J].
Wang, W ;
Swamy, MNS ;
Ahmad, MO ;
Wang, YK .
VLSI DESIGN, 2002, 14 (02) :183-191
[48]   An Efficient FPGA Design of Residue-to-Binary Converter for the Moduli Set {2n+1, 2n-1} [J].
Gbolagade, Kazeem Alagbe ;
Voicu, George Razvan ;
Cotofana, Sorin Dan .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2011, 19 (08) :1500-1503
[49]   A New Efficient RNS-to-Binary Conversion for the Three-Moduli Sets [J].
Ye, Yanlong ;
Hu, Jianhao ;
Ma, Shang ;
Ling, Xiang .
2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, :1000-1005
[50]   Group-oriented signature schemes based on Chinese remainder theorem [J].
Porkodi, C. ;
Arumuganathan, R. .
2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, :1660-1663