A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains

Publish Year: 1397
نوع سند: مقاله ژورنالی
زبان: English
View: 323

This Paper With 22 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-5-1_003

تاریخ نمایه سازی: 21 فروردین 1400

Abstract:

Jarvis and Nevins presented ETRU in 2013 which has applausive performance with moderate key-sizes and conjectured resistance to quantum computers. ETRU, as an efficient NTRUEncrypt-like cryptosystem, is over the ring of Eisenstein integers that is faster with smaller keys for the same or better level of security than does NTRUEncrypt which is a desirable alternative to public-key cryptosystems based on factorisation and discrete logarithm problem. However, because of its construction, doubts have regularly arisen on its security. In this paper, we propose how to modify ETRU to make it provably secure, under our modified assumption of quantum hardness of standard worst-case lattice problems, restricted to extended ideal lattices related to some extensions of cyclotomic fields structures. We describe the structure of all generated polynomial rings of quotient over direct product of Dedekind domains Z and Z[ζ3], where ζ3 is complex cube root of unity. We give a detailed description to show that if the private key polynomials of the ETRU are selected from direct product of some Dedekind domains using discrete Gaussians, then the public key, which is their ratio, is statistically indistinguishable from uniform over its range. The security then proves for our main system from the already proven hardness of the R-SIS and R-LWE problems by their extensions.

Authors

Reza Ebrahimi Atani

Department of Computer Engineering, University of Guilan, P. O. Box ۳۷۵۶, Rasht, Iran.

Shahabaddin Ebrahimi Atani

Department of Mathematics, University of Guilan, P. O. Box ۱۹۱۴, Rasht, Iran.

Amir Hassani Karbasi

Department of Mathematics, University of Guilan, P. O. Box ۱۹۱۴, Rasht, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • J. Hoffstein, J. Pipher, , and J. H. Silverman. NTRU: a new high ...
  • J. Hoffstein, J. Pipher, and J. H. Silverman. NTRU: a ring based public ...
  • IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000, pages ...
  • Ray A. Perlner and D. A. Cooper. Quantum resistant public key cryptography: ...
  • J. Hoffstein, J. P., and J. H. Silverman. NSS: An NTRU Lattice-Based Signature ...
  • M. Szydlo. Hypercubic Lattice Reduction and Analysis of GGH and NTRU ...
  • S. Min, G. Yamamoto, and K. Kim. Weak property of malleability in NTRUSign. ...
  • P. Q. Nguyen and O. Regev. Learning a parallelepiped: Cryptanalysis of GGH ...
  • V. Lyubashevsky and D. Micciancio. Generalized compact knapsacks are collision resistant. In ...
  • C. Peikert and A. Rosen. Lattices that admit logarithmic worst-case to average-case ...
  • C. Peikert and A. Rosen. Efficient collision-resistant hashing from worst-case assumptions on ...
  • V. Lyubashevsky, D. Micciancio, C. Peikert, and A. Rosen. SWIFFT: a modest proposal for ...
  • V. Lyubashevskyand C. Peikert and O. Regev. On ideal lattices and learning with ...
  • O. Regev. On lattices, learning with errors, random linear codes, and ...
  • D. Stehlé, R. Steinfeld, K. Tanaka, and K. Xagawa. Efficient public key encryption based ...
  • C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new ...
  • V. Lyubashevsky. Fiat-shamir with aborts: Applications to lattice and factoring-based signatures. ...
  • P.L Cayrel, R. Lindner, M. Rückert, and R. Silva. A lattice-based threshold ring ...
  • D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert. Bonsai trees, or how to ...
  • C. Gentry. Toward basing fully homomorphic encryption on worst-case hardness. In ...
  • C. Gentry and S. Halevi. Fully homomorphic encryption without squashing using depth-3 ...
  • V. Vaikuntanathan Z. Brakerski, C. Gentry. Fully homomorphic encryption without bootstrapping. Cryptology ePrint ...
  • V. Lyubashevsky. Lattice-based identification schemes secure under active attacks. In International ...
  • A. Kawachi, K. Tanaka, and K. Xagawa. Concurrently secure identification schemes and ad ...
  • C. Peikert and V. Vaikuntanathan. Noninteractive statistical zero-knowledge proofs for lattice problems. ...
  • Philippe Gaborit, Julien Ohler, and Patrick Solé. CTRU, a polynomial ...
  • Keywords: POPOV NORMAL FORM ; VARSHAMOV GILBERT BOUND ; CRYPTOGRAPHY ...
  • M. Coglianese and B.M. Goi. MaTRU: A New NTRU-Based Cryptosystem. In ...
  • N. Vats. NNRU, a Noncommutative Analogue of NTRU. arXiv preprint arXiv:0902.1891, ...
  • R. Kouzmenko. Generalizations of the NTRU Cryptosystem. PhD thesis, Master’s thesis, ...
  • M. EHSAN, Z. ALI, and M. ATEFEH. QTRU: Quaternionic Version of the NTRU ...
  • A. H. Karbasi and R. E. Atani. ILTRU: An NTRU-Like Public Key ...
  • A.H. Karbasi and R.E. Atani. A Survey on Lattice-based Cryptography. ...
  • M. Ajtai. Generating hard instances of lattice problems (extended abstrat). In ...
  • O. Regev. The learning with errors problem. http://www.cs.tau.ac.il/~odedr/, Date Accessed: 2010. ...
  • M. EHSAN, Z. ALI, and M. ATEFEH. Generalized compact knapsacks,cyclic lattices, and efficient ...
  • D. Stehlé and R. Steinfeld. Making NTRUEncrypt and NTRUSign as secure as ...
  • C. Peikert. An efficient and parallel gaussian sampler for lattices. In ...
  • L. Ducas and P. Q. Nguyen. Faster gaussian lattice sampling using lazy ...
  • N. H. Graham, J. H. Silverman, A. Singer, and W. Whyte. NAEP: Provable security ...
  • R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary, and H. Wang. NTRUCCA: How to Strengthen ...
  • A. L. Alt, E. Tromer, and V. Vaikuntanathan. On-the-fly multiparty computation on the ...
  • K. Jarvis and M. Nevins. ETRU: NTRU over the Eisenstein Integers. Designs ...
  • D. Micciancio and O. Regev. Worst-case to average-case reductions based on gaussian ...
  • A.H. Karbasi and R.E. Atani. PSTRU: A provably secure variant ...
  • K. Jarvis. NTRU over the Eisenstein integers. PhD thesis, University of ...
  • H. Cohen. Advanced topics in computational number theory. Springer, 2000. ...
  • C. Fieker and D. Stehlé. Short bases of lattices over number fields. ...
  • A. K. Lenstra, H. W. LenstraJr, and L. Lovász. Factoring polynomials with rational ...
  • C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. ...
  • D. Micciancio and P. Voulgaris. A deterministic single exponential time algorithm for ...
  • B. Applebaum, D. Cash, C. Peikert, and A. Sahai. Fast cryptographic primitives and circular-secure ...
  • V. Lyubashevsky, C. Peikert, and O. Regev. On ideal lattices and learning with ...
  • V. Lyubashevsky, C. Peikert, and O. Regev. A toolkit for Ring-LWE cryptography. In ...
  • L. Ducas and A. Durmus. Ring-LWE in polynomial rings. In International Workshop ...
  • P. Garrett. Abstract Algebra. Technical report, University of Minnesota, 2007. [ .pdf ] ...
  • R. Lindner and C. Peikert. Better key sizes (and attacks) for LWE-based ...
  • D. Micciancio and C. Peikert. Trapdoors for lattices: Simpler, tighter, faster, smaller. ...
  • D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert. Bonsai trees, or how to ...
  • S. Agrawal, D. Boneh, and X. Boyen. Efficient lattice (H)IBE in the standard ...
  • S. Agrawal, D. Boneh, and X. Boyen. Lattice basis delegation in fixed dimension ...
  • Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from (standard) LWE. ...
  • Z. Brakerski, C. Gentry, and V. Vaikuntanathan. (Leveled) fully homomorphic encryption without bootstrapping. ...
  • X. Boyen. lattice mixing and vanishing trapdoors: A framework for fully ...
  • V. Lyubashevsky. Lattice signatures without trapdoors. In Annual International Conference on ...
  • A CCA۲-Secure Incomparable Public Key Encryption Scheme [مقاله ژورنالی]
  • JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH [مقاله ژورنالی]
  • A Weak Blind Signature Based on Quantum Key Distribution [مقاله ژورنالی]
  • A. H. Karbasi, S. E. Atani, and R. E. Atani. PairTRU: Pairwise Non-commutative ...
  • R. E. Atani, S. E. Atani, and A. H. Karbasi. NETRU: A Non-commutative ...
  • نمایش کامل مراجع