Details of Research Outputs

TitleEfficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform
Creator
Date Issued2023
Conference Name21st International Conference on Applied Cryptography and Network Security, ACNS 2023
Source PublicationApplied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings
EditorJianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich
ISBN978-3-031-41180-9
ISSN0302-9743
VolumeLecture Notes in Computer Science (LNCS,volume 13907)
Pages439-458
Conference DateJune 19–22, 2023
Conference PlaceKyoto, Japan
Publication PlaceCham
PublisherSpringer
Abstract

With the development of quantum computers, NIST started post-quantum cryptography standardization to design post-quantum-secure cryptographic algorithms. Saber is a cryptosystem in third-round public-key encryption and key-establishment algorithm finalists. Because of its power of 2 number theoretic transform (NTT)-unfriendly ring, originally, Karatsuba polynomial multiplication algorithm (KPMA) and Toom-Cook polynomial multiplication algorithm (TCPMA) are used to speed up its computation-intensive matrix-vector multiplications. In later studies, NTT-based methods are applied to Saber on ARM platforms and result in a 61% speed-up. This work aims at adapting Saber with existing polynomial multiplication algorithms (PMAs), including non-NTT-based and NTT-based PMAs, to two energy-efficient RISC-V development boards, SiFive HiFive1 Rev B as well as Terasic T-Core. A 32-bit multiplier adapting Barrett reduction is designed to solve the overflow problem caused by RISC-V platform limitation. Experiment results show that the computation complexity depends on the algorithm choice and the underlying platform. NTT-based algorithms analytically have obvious advantages compared with non-NTT-based PMAs. However, the on-board cycle count on T-Core shows that NTT-based algorithms may have no comparability with non-NTT-based algorithms due to the high complexity overflow solutions. In addition, using the newly designed 32-bit multiplier can result in a 36.4% speed-up in practice. These results suggest several criteria for selecting algorithms on different platforms. This project can serve as a reference for future exploratory studies.

KeywordBarrett reduction Number theoretic transform Polynomial multiplication Post quantum cryptography (PQC) RISC-V Saber
DOI10.1007/978-3-031-41181-6_24
URLView source
Language英语English
Scopus ID2-s2.0-85174440846
Citation statistics
Cited Times:1[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/11674
CollectionFaculty of Science and Technology
Corresponding AuthorChen, Donglong
Affiliation
1.Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science,BNU-HKBU United International College,Zhuhai,China
2.School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing,China
First Author AffilicationBeijing Normal-Hong Kong Baptist University
Corresponding Author AffilicationBeijing Normal-Hong Kong Baptist University
Recommended Citation
GB/T 7714
Zhao, Haosong,Su, Rui,Lin, Ruiet al. Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform[C]//Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich. Cham: Springer, 2023: 439-458.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Zhao, Haosong]'s Articles
[Su, Rui]'s Articles
[Lin, Rui]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhao, Haosong]'s Articles
[Su, Rui]'s Articles
[Lin, Rui]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhao, Haosong]'s Articles
[Su, Rui]'s Articles
[Lin, Rui]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.