Title | Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform |
Creator | |
Date Issued | 2023 |
Conference Name | 21st International Conference on Applied Cryptography and Network Security, ACNS 2023 |
Source Publication | Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings
![]() |
Editor | Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich |
ISBN | 978-3-031-41180-9 |
ISSN | 0302-9743 |
Volume | Lecture Notes in Computer Science (LNCS,volume 13907) |
Pages | 439-458 |
Conference Date | June 19–22, 2023 |
Conference Place | Kyoto, Japan |
Publication Place | Cham |
Publisher | Springer |
Abstract | With the development of quantum computers, NIST started post-quantum cryptography standardization to design post-quantum-secure cryptographic algorithms. Saber is a cryptosystem in third-round public-key encryption and key-establishment algorithm finalists. Because of its power of 2 number theoretic transform (NTT)-unfriendly ring, originally, Karatsuba polynomial multiplication algorithm (KPMA) and Toom-Cook polynomial multiplication algorithm (TCPMA) are used to speed up its computation-intensive matrix-vector multiplications. In later studies, NTT-based methods are applied to Saber on ARM platforms and result in a 61% speed-up. This work aims at adapting Saber with existing polynomial multiplication algorithms (PMAs), including non-NTT-based and NTT-based PMAs, to two energy-efficient RISC-V development boards, SiFive HiFive1 Rev B as well as Terasic T-Core. A 32-bit multiplier adapting Barrett reduction is designed to solve the overflow problem caused by RISC-V platform limitation. Experiment results show that the computation complexity depends on the algorithm choice and the underlying platform. NTT-based algorithms analytically have obvious advantages compared with non-NTT-based PMAs. However, the on-board cycle count on T-Core shows that NTT-based algorithms may have no comparability with non-NTT-based algorithms due to the high complexity overflow solutions. In addition, using the newly designed 32-bit multiplier can result in a 36.4% speed-up in practice. These results suggest several criteria for selecting algorithms on different platforms. This project can serve as a reference for future exploratory studies. |
Keyword | Barrett reduction Number theoretic transform Polynomial multiplication Post quantum cryptography (PQC) RISC-V Saber |
DOI | 10.1007/978-3-031-41181-6_24 |
URL | View source |
Language | 英语English |
Scopus ID | 2-s2.0-85174440846 |
Citation statistics | |
Document Type | Conference paper |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/11674 |
Collection | Faculty of Science and Technology |
Corresponding Author | Chen, Donglong |
Affiliation | 1.Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science,BNU-HKBU United International College,Zhuhai,China 2.School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing,China |
First Author Affilication | Beijing Normal-Hong Kong Baptist University |
Corresponding Author Affilication | Beijing Normal-Hong Kong Baptist University |
Recommended Citation GB/T 7714 | Zhao, Haosong,Su, Rui,Lin, Ruiet al. Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform[C]//Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich. Cham: Springer, 2023: 439-458. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment