Cargando…
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this pro...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8394914/ https://www.ncbi.nlm.nih.gov/pubmed/34441077 http://dx.doi.org/10.3390/e23080938 |
_version_ | 1783744053117976576 |
---|---|
author | Wang, Jiabo Ling, Cong |
author_facet | Wang, Jiabo Ling, Cong |
author_sort | Wang, Jiabo |
collection | PubMed |
description | There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by [Formula: see text] , while a DFR of [Formula: see text] is achieved a for code rate pf 0.25, [Formula: see text] 12,289, and binomial parameter [Formula: see text]. Moreover, polar encoding and decoding have a quasilinear complexity [Formula: see text] and intrinsically support constant-time implementations. |
format | Online Article Text |
id | pubmed-8394914 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-83949142021-08-28 How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption Wang, Jiabo Ling, Cong Entropy (Basel) Article There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by [Formula: see text] , while a DFR of [Formula: see text] is achieved a for code rate pf 0.25, [Formula: see text] 12,289, and binomial parameter [Formula: see text]. Moreover, polar encoding and decoding have a quasilinear complexity [Formula: see text] and intrinsically support constant-time implementations. MDPI 2021-07-23 /pmc/articles/PMC8394914/ /pubmed/34441077 http://dx.doi.org/10.3390/e23080938 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Wang, Jiabo Ling, Cong How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title | How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title_full | How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title_fullStr | How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title_full_unstemmed | How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title_short | How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption |
title_sort | how to construct polar codes for ring-lwe-based public key encryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8394914/ https://www.ncbi.nlm.nih.gov/pubmed/34441077 http://dx.doi.org/10.3390/e23080938 |
work_keys_str_mv | AT wangjiabo howtoconstructpolarcodesforringlwebasedpublickeyencryption AT lingcong howtoconstructpolarcodesforringlwebasedpublickeyencryption |