Cryptology ePrint Archive: Report 2018/1238

Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform

Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi

Abstract: Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could run on small devices with limited storage capacity and computation resources such as IoT sensor nodes or smart cards. We present the first implementation of a lattice-based encryption scheme on the standard Java Card platform by combining number theoretic transform and improved Montgomery modular multiplication. The running time of decryption is nearly optimal (about 7 seconds for 128-bit security level). We also optimize discrete Ziggurat algorithm and Knuth-Yao algorithm to sample from prescribed probability distributions on the Java Card platform. More importantly, we indicate that polynomial multiplication can be performed on Java Card efficiently even if the long integers are not supported, which makes running more lattice-based cryptosystems on smart cards achievable.

Category / Keywords: implementation / Post-Quantum Cryptography, Lattice-based Encryption Scheme, Java Card, Discrete Gaussian Sampling, Montgomery Modular Multiplication, Number Theoretic Transform

Original Publication (with major differences): Proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
DOI:
10.1109/HST.2017.7951796

Date: received 26 Dec 2018

Contact author: y-yuan at math kyushu-u ac jp

Available format(s): PDF | BibTeX Citation

Note: A preliminary version of this paper appeared with the title "Memory-constrained implementation of lattice-based encryption scheme on standard Java Card" in proceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

Version: 20181231:120530 (All versions of this report)

Short URL: ia.cr/2018/1238


[ Cryptology ePrint archive ]