NFLlib: NTT-Based Fast Lattice Library
@inproceedings{Melchor2016NFLlibNF, title={NFLlib: NTT-Based Fast Lattice Library}, author={Carlos Aguilar Melchor and Joris Barrier and Serge Guelton and Adrien Guinet and Marc-Olivier Killijian and Tancr{\`e}de Lepoint}, booktitle={CT-RSA}, year={2016} }
Recent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alternative to classical cryptographic schemes.
In this paper, we introduce NFLlib, an efficient and open-source C++ library dedicated to ideal lattice cryptography in the widely-spread polynomial ring $$\mathbb Z_{p}[x]/x^n+1$$ for n a power of 2. The library combines algorithmic…
122 Citations
Λολ: Functional Lattice Cryptography
- Computer Science, MathematicsCCS
- 2016
This work defines and analyzes a variety of mathematical objects and algorithms for the recommended usage of Ring-LWE in cyclotomic rings, which it is believed will serve as a useful knowledge base for future implementations.
RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform
- Computer Science2020 30th International Conference on Field-Programmable Logic and Applications (FPL)
- 2020
The proposed design is respectively 6x, 40x, and 3x more efficient than the baseline solution, Berkeley Out-of-Order Machine, and a prior HW/SW co-design, while providing the needed flexibility.
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform
- Computer Science, Mathematics
- 2020
This paper evaluates three cases of flexible design methods for NTT implementation: parametric hardware design, high-level synthesis (HLS) design approach, and design for software implementation compiled on soft-core processors, where all are targeted on reconfigurable hardware devices.
A Full RNS Variant of Approximate Homomorphic Encryption
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018
A variant of approximate homomorphic encryption which is optimal for implementation on standard computer system is presented and a new structure of ciphertext modulus is introduced which allows us to use both the RNS decomposition of cyclotomic polynomials and the NTT conversion on each of the R NS components.
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs
- Computer Science, MathematicsJ. Parallel Distributed Comput.
- 2018
Parameter selection in lattice-based cryptography
- Computer Science, Mathematics
- 2018
This thesis considers parameter selection in cryptosystems based on LWE, with a focus on security, and discusses the selection of parameters in SEAL, an implementation of the scheme by Fan and Vercauteren.
Post-quantum Lattice-based Cryptography Implementations: A Survey
- Computer Science, Mathematics
- 2019
This work survey trends in lattice-based cryptographic schemes, some recent fundamental proposals for the use of lattices in computer security, challenges for their implementation in software and hardware, and emerging needs for their adoption.
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation
- Mathematics, Computer Science2020 IEEE International Workshop on Information Forensics and Security (WIFS)
- 2020
A generalized version of the fast Walsh-Hadamard Transform is introduced which enables faster degree-n polynomial multiplications by reducing the required elemental products by a factor of $\mathcal{O}(\log n)$.
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA
- Computer Science, MathematicsIACR Trans. Cryptogr. Hardw. Embed. Syst.
- 2018
This work presents a CUDAbased implementation of the Fan and Vercauteren (FV) Somewhat HomomorphicEncryption (SHE) scheme and demonstrates several algebraic tools such as the Chinese Remainder Theorem, Residual Number System (RNS) and Discrete Galois Transform (DGT) to accelerate and facilitate FV computation on GPUs.
Post-Quantum Lattice-Based Cryptography Implementations
- Computer Science, MathematicsACM Comput. Surv.
- 2019
This work survey trends in lattice-based cryptographic schemes, some recent fundamental proposals for the use of lattices in computer security, challenges for their implementation in software and hardware, and emerging needs for their adoption.
References
SHOWING 1-10 OF 37 REFERENCES
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
- Computer Science, MathematicsLATINCRYPT
- 2012
This work makes a first step towards efficient FFT-based arithmetic for lattice-based cryptography and shows that the FFT can be implemented efficiently on reconfigurable hardware.
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
- Computer Science, MathematicsCHES
- 2012
This work gives a comparison between a matrix and polynomial based variant of the LWE scheme, and examines three different variants for sampling Gaussian distributed integers in hardware, namely rejection sampling, a rounding based approach, and a look-up table based approach.
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
- Computer Science, MathematicsASIACRYPT
- 2015
This work provides the first implementation of such approximate multilinear maps based on ideal lattices using GGH-like schemes, and proposes algorithms and implementations for sampling from discrete Gaussians, for inverting in some Cyclotomic number fields and for computing norms of ideals in some Cyclone number rings.
Efficient Identity-Based Encryption over NTRU Lattices
- Computer Science, MathematicsASIACRYPT
- 2014
This work presents the first lattice-based IBE scheme with practical parameters and obtains digital signature schemes which are shorter than the previously most-compact ones of Ducas, Durmus, Lepoint, and Lyubashevsky from Crypto 2013.
High Performance Lattice-based CCA-secure Encryption
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015
This paper gives a thorough security analysis as well as an efficient implementation of the CCA1-secure encryption scheme instantiated with the most efficient trapdoor construction and attest that it even outperforms the CPA- secure encryption scheme from Lindner and Peikert presented at CT-RSA 2011.
An Efficient and Parallel Gaussian Sampler for Lattices
- Computer Science, MathematicsCRYPTO
- 2010
To the knowledge, this is the first algorithm and rigorous analysis demonstrating the security of a perturbation-like technique and a new Gaussian sampling algorithm for lattices that is efficient and highly parallelizable.
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
- Computer ScienceASIACRYPT
- 2012
This work introduces a laziness technique that can significantly speed up lattice sampling algorithms, in certain cases such as NTRUSign lattices, laziness can decrease the complexity to O( n2) or even O(n).
Lattice Signatures and Bimodal Gaussians
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2013
A construction of a lattice-based digital signature scheme that represents an improvement over today’s most efficient lattice schemes and has shorter signature and public key sizes than all previously proposed lattice signature schemes.
Accelerating NTRU based homomorphic encryption using GPUs
- Computer Science, Mathematics2014 IEEE High Performance Extreme Computing Conference (HPEC)
- 2014
A large polynomial arithmetic library optimized for Nvidia GPUs to support fully homomorphic encryption schemes and is put to use to evaluate homomorphic evaluation of two block ciphers: Prince and AES.
Lattice Signatures Without Trapdoors
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2011
This work provides an alternative method for constructing lattice-based digital signatures which does not use the "hash-and-sign" methodology, and shows that by slightly changing the parameters, one can get even more efficient signatures that are based on the hardness of the Learning With Errors problem.