Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform
Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based enc...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-07-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12012 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850223419011891200 |
|---|---|
| author | Ye Yuan Kazuhide Fukushima Junting Xiao Shinsaku Kiyomoto Tsuyoshi Takagi |
| author_facet | Ye Yuan Kazuhide Fukushima Junting Xiao Shinsaku Kiyomoto Tsuyoshi Takagi |
| author_sort | Ye Yuan |
| collection | DOAJ |
| description | Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based encryption scheme on a standard Java Card platform by combining the number theoretic transform with improved Montgomery modular multiplication. Without any cryptographic coprocessor support, the decryption running time is around 7 s, corresponding to the AES‐128 security level. Two efficient discrete Gaussian sampling approaches, known at the discrete Ziggurat sampling algorithm and Knuth–Yao algorithm, were implemented on the Java Card and resulted in a reduction in running times. More important, polynomial modular multiplication is shown to perform efficiently on a standard Java Card platform even when the big integers and floating‐point number operations are not supported. The results show the feasibility of implementing more lattice‐based cryptosystems on existing memory‐constrained Java Cards. A preliminary version of this paper appeared with the title ‘Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card’ in Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). |
| format | Article |
| id | doaj-art-5727eae73af24b4ca236c06072b6ec53 |
| institution | OA Journals |
| issn | 1751-8709 1751-8717 |
| language | English |
| publishDate | 2021-07-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-5727eae73af24b4ca236c06072b6ec532025-08-20T02:05:57ZengWileyIET Information Security1751-87091751-87172021-07-0115426728110.1049/ise2.12012Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platformYe Yuan0Kazuhide Fukushima1Junting Xiao2Shinsaku Kiyomoto3Tsuyoshi Takagi4Graduate School of Mathematics Kyushu University Fukuoka JapanKDDI Research, Inc Fujimino JapanGraduate School of Mathematics Kyushu University Fukuoka JapanKDDI Research, Inc Fujimino JapanDepartment of Mathematical Informatics The University of Tokyo Tokyo JapanAbstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented of the original ring–learning‐with‐errors‐based encryption scheme on a standard Java Card platform by combining the number theoretic transform with improved Montgomery modular multiplication. Without any cryptographic coprocessor support, the decryption running time is around 7 s, corresponding to the AES‐128 security level. Two efficient discrete Gaussian sampling approaches, known at the discrete Ziggurat sampling algorithm and Knuth–Yao algorithm, were implemented on the Java Card and resulted in a reduction in running times. More important, polynomial modular multiplication is shown to perform efficiently on a standard Java Card platform even when the big integers and floating‐point number operations are not supported. The results show the feasibility of implementing more lattice‐based cryptosystems on existing memory‐constrained Java Cards. A preliminary version of this paper appeared with the title ‘Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card’ in Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).https://doi.org/10.1049/ise2.12012cryptographyGaussian processesJavapolynomialssmart cards |
| spellingShingle | Ye Yuan Kazuhide Fukushima Junting Xiao Shinsaku Kiyomoto Tsuyoshi Takagi Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform IET Information Security cryptography Gaussian processes Java polynomials smart cards |
| title | Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform |
| title_full | Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform |
| title_fullStr | Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform |
| title_full_unstemmed | Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform |
| title_short | Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform |
| title_sort | memory constrained implementation of lattice based encryption scheme on standard java card platform |
| topic | cryptography Gaussian processes Java polynomials smart cards |
| url | https://doi.org/10.1049/ise2.12012 |
| work_keys_str_mv | AT yeyuan memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform AT kazuhidefukushima memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform AT juntingxiao memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform AT shinsakukiyomoto memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform AT tsuyoshitakagi memoryconstrainedimplementationoflatticebasedencryptionschemeonstandardjavacardplatform |