Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression

05/11/2022
by   Zhichuang Liang, et al.
0

The NTRU lattice is a promising candidate to construct practical cryptosystems resistant to quantum computing attacks, and particularly plays a leading role in the ongoing NIST post-quantum cryptography standardization. On the one hand, it is benefited from a strong security guarantee since it has essentially not been broken over 24 years. On the other hand, all the known patent threats against NTRU have expired, which is deemed a critical factor for consideration when deploying PQC algorithms in reality. Nevertheless, there are still some obstacles to the computational efficiency and bandwidth complexity of NTRU-based constructions of key encapsulation mechanisms (KEM). To address these issues, we propose a compact and efficient KEM based on the NTRU lattice, called CTRU, by introducing a scalable ciphertext compression technique. It demonstrates a new approach to decrypting NTRU ciphertext, where the plaintext message is recovered with the aid of our decoding algorithm in the scalable E_8 lattice. The instantiation of CTRU is over the NTT-friendly rings of the form ℤ_q[x]/(x^n-x^n/2+1). To our knowledge, our CTRU is the most bandwidth efficient KEM based on the NTRU lattice up to now. In addition, compared to other NTRU-based KEM schemes, CTRU has stronger security against known attacks, enjoys more robust CCA security reduction (starting from IND-CPA rather than OW-CPA), and its encapsulation and decapsulation processes are also among the most efficient. When compared to the NIST Round 3 finalist NTRU-HRSS, our CTRU-768 has 15% smaller ciphertext size and its security is strengthened by (45,40) bits for classical and quantum security respectively. When compared to the NIST Round 3 finalist Kyber that is based on the Module-LWE assumption, CTRU has both smaller bandwidth and lower error probabilities at about the same security level.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/13/2018

Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things

The Ukraine power grid cyberattacks remind us that the smart Internet of...
research
05/12/2021

Lattice sieving via quantum random walks

Lattice-based cryptography is one of the leading proposals for post-quan...
research
03/05/2023

A Provably Secure Strong PUF based on LWE: Construction and Implementation

We construct a strong PUF with provable security against ML attacks on b...
research
07/10/2019

Evolutionary techniques in lattice sieving algorithms

Lattice-based cryptography has recently emerged as a prominent candidate...
research
04/18/2018

A voting scheme with post-quantum security based on physical laws

Traditional cryptography is under huge threat along of the evolution of ...
research
11/18/2019

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...
research
04/07/2018

Why 1.02? The root Hermite factor of LLL and stochastic sandpile models

In lattice-based cryptography, a disturbing and puzzling fact is that th...

Please sign up or login with your details

Forgot password? Click here to reset