Polar coding for Ring-LWE-based public key encryption
-
Published:2022-09-24
Issue:2
Volume:15
Page:397-431
-
ISSN:1936-2447
-
Container-title:Cryptography and Communications
-
language:en
-
Short-container-title:Cryptogr. Commun.
Author:
Wang JiaboORCID, Ling Cong
Abstract
AbstractThe ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution, normally a Gaussian-like distribution, is involved in the RLWE problem. In this work we focus on using polar codes to alleviate a natural trade-off present in RLWE public key encryption schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the bit-security level by using wider error distribution while keeping the target decryption failure rate achievable. The approach we proposed in this work is twofold. Firstly, we formulate RLWE public key encryption as a channel model with some noise terms known by the decoder. This makes our approach distinguished from existing research of this kind in the literature which ignores these known terms. Secondly, we design polar codes for the derived channel model. Theoretically and numerically, we show the proposed modeling and polar coding scheme contributes to a considerable bit-security level improvement compared with NewHope, a submission to National Institute of Standards and Technology (NIST), with almost the same parameters. Moreover, polar encoding and decoding support isochronous implementations in the sense that the timings of associated operations are irrelevant to the sensitive information.
Funder
Engineering and Physical Sciences Research Council National Research Foundation Singapore
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference37 articles.
1. Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9(3), 169–203 (2015) 2. Albrecht, MR, Curtis, BR, Deo, A, Davidson, A, Player, R, Postlethwaite, EW, Virdia, F, Wunderer, T Catalano, D, De Prisco, R (eds.): Estimate All the LWE, NTRU schemes!. Springer International Publishing, Cham (2018) 3. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: NewHope without reconciliation. IACR Cryptology ePrint Archive, 1157 (2016) 4. Alkim, E, Ducas, L, Pöppelmann, T, Schwabe, P: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium, pp 327–43 (2016b) 5. Arikan, E.: Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 55(7), 3051–73 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|