Cargando…

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption

There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this pro...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Jiabo, Ling, Cong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8394914/
https://www.ncbi.nlm.nih.gov/pubmed/34441077
http://dx.doi.org/10.3390/e23080938
_version_ 1783744053117976576
author Wang, Jiabo
Ling, Cong
author_facet Wang, Jiabo
Ling, Cong
author_sort Wang, Jiabo
collection PubMed
description There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by [Formula: see text] , while a DFR of [Formula: see text] is achieved a for code rate pf 0.25, [Formula: see text] 12,289, and binomial parameter [Formula: see text]. Moreover, polar encoding and decoding have a quasilinear complexity [Formula: see text] and intrinsically support constant-time implementations.
format Online
Article
Text
id pubmed-8394914
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83949142021-08-28 How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption Wang, Jiabo Ling, Cong Entropy (Basel) Article There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate (DFR). A straightforward solution to this problem is the error-correcting code, which is commonly used in communication systems and already appears in some RLWE-based proposals. However, applying error-correcting codes to those cryptographic schemes is far from simply installing an add-on. Firstly, the residue error term derived by decryption has correlated coefficients, whereas most prevalent error-correcting codes with remarkable error tolerance assume the channel noise to be independent and memoryless. This explains why only simple error-correcting methods are used in existing RLWE-based PKE schemes. Secondly, the residue error term has correlated coefficients leaving accurate DFR estimation challenging even for uncoded plaintext. It can be found in the literature that a tighter DFR estimation can effectively create a DFR margin. Thirdly, most error-correcting codes are not well designed for safety considerations, e.g., syndrome decoding has a nonconstant time nature. A code good at error correcting might be weak under a variety of attacks. In this work, we propose a polar coding scheme for RLWE-based PKE. A relaxed “independence” assumption is used to derive an uncorrelated residue noise term, and a wireless communication strategy, outage, is used to construct polar codes. Furthermore, some knowledge about the residue noise is exploited to improve the decoding performance. With the parameterization of NewHope Round 2, the proposed scheme creates a considerable DRF margin, which gives a competitive security improvement compared to state-of-the-art benchmarks. Specifically, the security is improved by [Formula: see text] , while a DFR of [Formula: see text] is achieved a for code rate pf 0.25, [Formula: see text] 12,289, and binomial parameter [Formula: see text]. Moreover, polar encoding and decoding have a quasilinear complexity [Formula: see text] and intrinsically support constant-time implementations. MDPI 2021-07-23 /pmc/articles/PMC8394914/ /pubmed/34441077 http://dx.doi.org/10.3390/e23080938 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Jiabo
Ling, Cong
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title_full How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title_fullStr How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title_full_unstemmed How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title_short How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption
title_sort how to construct polar codes for ring-lwe-based public key encryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8394914/
https://www.ncbi.nlm.nih.gov/pubmed/34441077
http://dx.doi.org/10.3390/e23080938
work_keys_str_mv AT wangjiabo howtoconstructpolarcodesforringlwebasedpublickeyencryption
AT lingcong howtoconstructpolarcodesforringlwebasedpublickeyencryption