Conference paper Open Access

NTTRU: Truly Fast NTRU Using NTT

Lyubashevsky , Vadim; Seiler, Gregor


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/e6b0addd-d907-4c6e-a8b9-48e3bbde49a3/14-NTTRU-Truly-Fast-NTRU-Using-NTT.pdf"
      }, 
      "checksum": "md5:188bdb5dc2a4f47942f3cb633648da49", 
      "bucket": "e6b0addd-d907-4c6e-a8b9-48e3bbde49a3", 
      "key": "14-NTTRU-Truly-Fast-NTRU-Using-NTT.pdf", 
      "type": "pdf", 
      "size": 654158
    }
  ], 
  "owners": [
    41483
  ], 
  "doi": "10.13154/tches.v2019.i3.180-201", 
  "stats": {
    "version_unique_downloads": 41.0, 
    "unique_views": 59.0, 
    "views": 60.0, 
    "version_views": 60.0, 
    "unique_downloads": 41.0, 
    "version_unique_views": 59.0, 
    "volume": 27474636.0, 
    "version_downloads": 42.0, 
    "downloads": 42.0, 
    "version_volume": 27474636.0
  }, 
  "links": {
    "doi": "https://doi.org/10.13154/tches.v2019.i3.180-201", 
    "latest_html": "https://zenodo.org/record/3355438", 
    "bucket": "https://zenodo.org/api/files/e6b0addd-d907-4c6e-a8b9-48e3bbde49a3", 
    "badge": "https://zenodo.org/badge/doi/10.13154/tches.v2019.i3.180-201.svg", 
    "html": "https://zenodo.org/record/3355438", 
    "latest": "https://zenodo.org/api/records/3355438"
  }, 
  "created": "2019-07-30T13:51:49.603469+00:00", 
  "updated": "2020-01-20T17:22:50.292468+00:00", 
  "conceptrecid": "3355437", 
  "revision": 4, 
  "id": 3355438, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.13154/tches.v2019.i3.180-201", 
    "description": "<p>We present NTTRU -- an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring&nbsp;Z7681[X]/(X768&minus;X384+1)Z7681[X]/(X768&minus;X384+1)&nbsp;and produces public keys and ciphertexts of approximately&nbsp;1.251.25&nbsp;KB at the&nbsp;128128-bit security level. The number of cycles on a Skylake CPU of our constant-time AVX2 implementation of the scheme for key generation, encapsulation and decapsulation is approximately&nbsp;6.46.4K,&nbsp;6.16.1K, and&nbsp;7.97.9K, which is more than 30X, 5X, and 8X faster than these respective procedures in the NTRU schemes that were submitted to the NIST post-quantum standardization process. These running times are also, by a large margin, smaller than those for all the other schemes in the NIST process. We also give a simple transformation that allows one to provably deal with small decryption errors in OW-CPA encryption schemes (such as NTRU) when using them to construct an IND-CCA2 key encapsulation.</p>", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "title": "NTTRU: Truly Fast NTRU Using NTT", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3355437"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3355438"
          }
        }
      ]
    }, 
    "communities": [
      {
        "id": "futuretpm-h2020"
      }
    ], 
    "grants": [
      {
        "code": "779391", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::779391"
        }, 
        "title": "Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module", 
        "acronym": "FutureTPM", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "public-key cryptography / NTRU", 
      "Lattice Cryptography, AVX2", 
      "NTT"
    ], 
    "publication_date": "2019-01-16", 
    "creators": [
      {
        "name": "Lyubashevsky , Vadim"
      }, 
      {
        "name": "Seiler, Gregor"
      }
    ], 
    "meeting": {
      "title": "Conference on Cryptographic Hardware and Embedded Systems 2019"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }
  }
}
60
42
views
downloads
Views 60
Downloads 42
Data volume 27.5 MB
Unique views 59
Unique downloads 41

Share

Cite as