[Resource Topic] 2021/619: Polar Coding for Ring-LWE-Based Public Key Encryption

Welcome to the resource topic for 2021/619

Title:
Polar Coding for Ring-LWE-Based Public Key Encryption

Authors: Jiabo Wang, Cong Ling

Abstract:

Cryptographic constructions based on \textit{ring learning with errors} (RLWE) have emerged as one of the front runners for the standardization of post quantum public key cryptography. As the standardization process continues, optimizing specific parts of proposed schemes becomes a worthwhile endeavor. In this work we focus on using error correcting codes to alleviate a natural trade-off present in most schemes; namely, we would like a wider error distribution to increase security, but a wider error distribution comes at the cost of an increased probability of decryption error. The motivation of this work is to improve the security level of RLWE-based public key encryption (PKE) while keeping the target decryption failure rate (DFR) achievable using error-correcting codes. Specifically, we explore how to implement a family member of error correcting codes, known as polar codes, in RLWE-based PKE schemes in order to effectively lower the DFR. The dependency existing in the additive noise term is handled by mapping every error term (e.g., e,t,s,e_1,e_2) under canonical embedding to the space H where a product in the number field K gives rise to a coordinate-wise product in H. An attempt has been made to make the modulation constellation (message basis) fit in with the canonical basis. Furthermore, we exploit the actuality of some error terms known by the decoder to further lower the DFR. Using our method, the DFR is expected to be as low as 2^{-298} for code rate 0.25, n=1024,q=12289 and binomial parameter k=8 as is exactly the setting of the post-quantum scheme NewHope; DFR is 2^{-156} for code rate 0.25, n=1024,q=12289,k=16. This new DFR margin enables us to improve the security level by 9.4\% compared with NewHope. Moreover, polar encoding and decoding have quasi-linear complexity O(N\log N) and they can be implemented in constant time.

ePrint: https://eprint.iacr.org/2021/619

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .