Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, So Hyun | - |
dc.contributor.author | Kim, Suhri | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.date.accessioned | 2021-08-31T16:00:16Z | - |
dc.date.available | 2021-08-31T16:00:16Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/58948 | - |
dc.description.abstract | In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring R-q = Z(q) [x]/f (x), using a cyclotomic polynomial f (x). Until now, the most preferred cyclotomic polynomials have been x(n) + 1, where n is a power of two, and x(n) + ... + x + 1, where n + 1 is a prime. The former results in the smallest decryption error size, but the choice of degree is limited. On the other hand, the latter gives rise to the largest decryption error size, but the choice of degree is very flexible. In this paper, we use a new polynomial ring R-q = Z(q)/f (x) with a cyclotomic trinomial f (x) = x(n) - x(n/2) + 1 as an intermediate that combines the advantages of the other rings. Since the degree n is chosen freely as n D 2(a)3(b) for positive integers a and b, the choice of the degree n is moderate. Furthermore, since the error propagation is small in the middle of polynomial multiplication in the new ring, if the middle part is truncated and used, the decryption error size can be reduced. Based on these observations, we propose a new, practical key encapsulation mechanism (KEM) that is constructed over a ring with a cyclotomic trinomial. The security of our KEM is based on the hardness of ring learning-with-rounding (LWR) problems. With appropriate parameterization for the current 128-bit security model, we show that our KEM obtains shorter secret keys and ciphertexts, especially compared to the previous Ring-LWR-based KEM, Round5, with no error correction code. We then implement our KEM and compare its performance with that of several KEMs that were presented in the second round of the NIST PQC conference. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1109/ACCESS.2020.3002223 | - |
dc.identifier.scopusid | 2-s2.0-85089539627 | - |
dc.identifier.wosid | 000546414500024 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp.112585 - 112597 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 112585 | - |
dc.citation.endPage | 112597 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Encoding | - |
dc.subject.keywordAuthor | NIST | - |
dc.subject.keywordAuthor | Public key | - |
dc.subject.keywordAuthor | Encapsulation | - |
dc.subject.keywordAuthor | Error correction codes | - |
dc.subject.keywordAuthor | Cyclotomic trinomial | - |
dc.subject.keywordAuthor | key encapsulation mechanism | - |
dc.subject.keywordAuthor | lattice-based encryption | - |
dc.subject.keywordAuthor | post-quantum cryptography | - |
dc.subject.keywordAuthor | ring-LWR problem | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.