Page 112 - Kaleidoscope Academic Conference Proceedings 2024
P. 112

2024 ITU Kaleidoscope Academic Conference




           approach simplifies key management, eliminates the need for  be added in the resultant p_t which form the public key.
           an additional symmetric key exchange, and reduces potential  H function is used in the decryption algorithm where it takes
           vulnerabilities, making it suitable for applications where  the ciphertext and uses it to provide the absolute difference
           overhead and complexity are critical concerns.     between the ciphertext matrix value and the value that came
           Our algorithm has demonstrated strong performance in both  from putting s in those equations in ciphertext with redundant
           encryption and decryption.  We’ve focused on reducing  dimensions and then we check the probability that it is less
           ciphertext size and optimizing multiplication complexity,  than     4  or not for decoding the bits.
                                                         2
           aiming for a time complexity of   (   log   ) rather than   (   ).
           This ensures both efficiency and security in establishing a  2.2  Gaussian Distribution
           highly secure communication channel.
           Lastly,  we  present  use  cases  for  our  messaging  As Regev [1] demonstrates a quantum reduction from
           solution, showing its applicability in secure governmental  worst-case lattice issues to LWE with Gaussian error, given
           communications,  financial  transactions,  and  private  arbitrarily many LWE samples, the Gaussian distribution is
           messaging, where quantum-resistant security is essential.  the default error distribution for classical LWE.
                                                              Definition.  Let D    be the Gaussian distribution with
                         2.  PRELIMINARIES                    standard deviation   . The rounded Gaussian distribution
                                                                       R
                                                              function D is defined as follows:
                                                                         
                                                                                          R
           2.1  Notations                                     For any    ∈ R, the sample    from D is obtained by rounding
                                                                                            
                                                                 to the nearest integer and adding a sample from D    .
           The set of integers is denoted by Z, Z q represents the finite  In mathematical notation:
           field of cardinality q and its elements are represented by the
                                   
                                      
           integers in the interval [−[ ], ].   (  ) denotes an encoded           = ⌊   +    + 0.5⌉
                                 2  2
           array of n integers like {   1 ,    2 ,    3 ....,       } each integer takes
                                             32
           4 bytes each makes the value range of 0 to 2 −1. D denotes  where    is a sample from D    . If X follows a Gaussian
                                                              distribution then the rounded Gaussian of       will be
           the Gaussian distribution and D    with standard deviation
                       −
             . Here,    ←    denotes the set of x belongs from the                   ∫     −1/2
           distributed error terms generated which is denoted by   .     Pr(   Z =   ) =          ,       
                                          
           Pr(  ) denotes the Probability of   .B denotes an array of 32                +1/2
                                          
           bits representing the ASCII value for a character.  In the following    = 0.
           Extendable Output Function (XOF) is a cryptographic  Goal. In here we have to find the distribution of    Z     =    Z
           primitive that takes a seed as input and produces an output of  mod q.
           any desired length. It’s like a versatile cryptographic tool that
           can generate data according to specified distributions. Let’s  Pr(   Z     = [  ]) = Pr(   Z =    +     )  for some    ∈ Z
           say we have a seed          and we want to use XOF to create
           matrices and vectors. We start by initializing XOF with the
           seed seed, and then we use it to generate the matrices and  ∑︁  ∫    +    −1/2  ∫    −1/2
                                                                                  0,   (  )      =       ,   (  )     
           vectors [22]. For example, we can generate a matrix    by
                                                                         +    +1/2           +1/2
           calling XOF with a specific seed seed    , and similarly, we    ∈Z
                                                              Where
           can generate a vector    by calling XOF with a seed seed    .
           Let seed be the seed used by the XOF, a variants of SHA               ∑︁    1      −(   +     ) 2
                                                                          ,   (  ) :    →  √  exp
           (secure hashing algorithm)-256 and SHA-128 pseudo number                                2
                                                                                        2        2  
           generators in these functions which give us a hash value of             ∈Z
           a definite length. To generate a matrix   , we call XOF with
                                                              2.3 LWE definition
           seed seed    :
                               ← XOF (seed    )               Learning With Errors (LWE) is a fundamental problem in
                                                              lattice-based cryptography and serves as the basis for many
           Similarly, to generate a vector   , we call XOF with seed seed    :
                                                              encryption schemes and cryptographic protocols[1][3][4].
                               ← XOF (seed    )               It involves the challenge of distinguishing between noisy
                                                              information and random noise in a set of equations. terms       .
                                                                                                          −
           The process is deterministic, meaning that for a given seed,  Notation. Let    be the rounded gaussian mod q and       ←   .
           XOF will always produce the same output. However, in  Definition.     > 0 be a modulus and   ,    > 0. Now given
           practice, XOF may use random oracles to achieve this  m samples of such equations of n dimesnions in the form of
                                                                                                           
           determinism while statistically approximating the desired  a i , < a i , s i > +e i where a i is uniform at random in Z and
                                                                                                           
                                                                 −
           distribution.                                            ←   . Find the secret    ∈ Z      
           The G function that when we send the   .   +    and   _  
           combine the function output the results as stored in   _   as  The LWE can be formulated more compactly as a

             256
            Í                                                 matrix-vector equation:
               =0     · (      −              ) so that the redundant lattice dimensions
           which was chosen randomly from 256 dimensions will not the           ·    +    =     mod   
                                                           – 68 –
   107   108   109   110   111   112   113   114   115   116   117