Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform

Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based enc...

Full description

Saved in:
Bibliographic Details
Main Authors: Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
Format: Article
Language:English
Published: Wiley 2021-07-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12012
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850223419011891200
author Ye Yuan
Kazuhide Fukushima
Junting Xiao
Shinsaku Kiyomoto
Tsuyoshi Takagi
author_facet Ye Yuan
Kazuhide Fukushima
Junting Xiao
Shinsaku Kiyomoto
Tsuyoshi Takagi
author_sort Ye Yuan
collection DOAJ
description Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based encryption scheme on a standard Java Card platform by combining the number theoretic transform with improved Montgomery modular multiplication. Without any cryptographic coprocessor support, the decryption running time is around 7 s, corresponding to the AES‐128 security level. Two efficient discrete Gaussian sampling approaches, known at the discrete Ziggurat sampling algorithm and Knuth–Yao algorithm, were implemented on the Java Card and resulted in a reduction in running times. More important, polynomial modular multiplication is shown to perform efficiently on a standard Java Card platform even when the big integers and floating‐point number operations are not supported. The results show the feasibility of implementing more lattice‐based cryptosystems on existing memory‐constrained Java Cards. A preliminary version of this paper appeared with the title ‘Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card’ in Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
format Article
id doaj-art-5727eae73af24b4ca236c06072b6ec53
institution OA Journals
issn 1751-8709
1751-8717
language English
publishDate 2021-07-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-5727eae73af24b4ca236c06072b6ec532025-08-20T02:05:57ZengWileyIET Information Security1751-87091751-87172021-07-0115426728110.1049/ise2.12012Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platformYe Yuan0Kazuhide Fukushima1Junting Xiao2Shinsaku Kiyomoto3Tsuyoshi Takagi4Graduate School of Mathematics Kyushu University Fukuoka JapanKDDI Research, Inc Fujimino JapanGraduate School of Mathematics Kyushu University Fukuoka JapanKDDI Research, Inc Fujimino JapanDepartment of Mathematical Informatics The University of Tokyo Tokyo JapanAbstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based encryption scheme on a standard Java Card platform by combining the number theoretic transform with improved Montgomery modular multiplication. Without any cryptographic coprocessor support, the decryption running time is around 7 s, corresponding to the AES‐128 security level. Two efficient discrete Gaussian sampling approaches, known at the discrete Ziggurat sampling algorithm and Knuth–Yao algorithm, were implemented on the Java Card and resulted in a reduction in running times. More important, polynomial modular multiplication is shown to perform efficiently on a standard Java Card platform even when the big integers and floating‐point number operations are not supported. The results show the feasibility of implementing more lattice‐based cryptosystems on existing memory‐constrained Java Cards. A preliminary version of this paper appeared with the title ‘Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card’ in Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).https://doi.org/10.1049/ise2.12012cryptographyGaussian processesJavapolynomialssmart cards
spellingShingle Ye Yuan
Kazuhide Fukushima
Junting Xiao
Shinsaku Kiyomoto
Tsuyoshi Takagi
Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
IET Information Security
cryptography
Gaussian processes
Java
polynomials
smart cards
title Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
title_full Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
title_fullStr Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
title_full_unstemmed Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
title_short Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
title_sort memory constrained implementation of lattice based encryption scheme on standard java card platform
topic cryptography
Gaussian processes
Java
polynomials
smart cards
url https://doi.org/10.1049/ise2.12012
work_keys_str_mv AT yeyuan memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform
AT kazuhidefukushima memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform
AT juntingxiao memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform
AT shinsakukiyomoto memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform
AT tsuyoshitakagi memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform