2022
DOI: 10.1109/jiot.2021.3122276
|View full text |Cite
|
Sign up to set email alerts
|

AxRLWE: A Multilevel Approximate Ring-LWE Co-Processor for Lightweight IoT Applications

Abstract: This work presents a multi-level approximation exploration undertaken on the Ring-Learning-with-Errors (R-LWE) based Public-key Cryptographic (PKC) schemes that belong to quantum-resilient cryptography algorithms. Among the various quantum-resilient cryptography schemes proposed in the currently running NIST's Post-quantum Cryptography (PQC) standardization plan, the lattice based LWE schemes have emerged as the most viable and preferred class for the IoT applications due to their compact area and memory footp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Note that we do not include the following designs since: 1) the design of [29] is a special design based on LUT-like method; 2) the structures of [28] and [30] belong to compact designs (similar to [43], which is a compact implementation of an approximate Ring-LWE based scheme); and 3) the designs in [31] and Architecture-II of [33] did not consider the input-output processing resources in structural design.…”
Section: Major Area-time Complexities For the Proposed Rblwe-based Ac...mentioning
confidence: 99%
“…Note that we do not include the following designs since: 1) the design of [29] is a special design based on LUT-like method; 2) the structures of [28] and [30] belong to compact designs (similar to [43], which is a compact implementation of an approximate Ring-LWE based scheme); and 3) the designs in [31] and Architecture-II of [33] did not consider the input-output processing resources in structural design.…”
Section: Major Area-time Complexities For the Proposed Rblwe-based Ac...mentioning
confidence: 99%
“…Since this paper focuses on BRLWE-based PQC structures, we do not compare them with the existing regular Ring-LWE based designs (different errors/schemes/structures). Nevertheless, Ring-LWE based work, such as [10] and [21], represent important PQC implementations in the field. The Ring-LWE of [10] deploys DSPs and BRAMs for parallel-processing, and the AxRing-LWE based design in [21] uses an approximate method for resource-limited applications.…”
Section: Complexity Analysis and Comparisonmentioning
confidence: 99%
“…Nevertheless, Ring-LWE based work, such as [10] and [21], represent important PQC implementations in the field. The Ring-LWE of [10] deploys DSPs and BRAMs for parallel-processing, and the AxRing-LWE based design in [21] uses an approximate method for resource-limited applications. Future work directions include side-channel attacks [22] and algorithm innovations.…”
Section: Complexity Analysis and Comparisonmentioning
confidence: 99%
“…Earlier efforts of approximation have rightly targeted the two main bottlenecks of LWE systems, i.e., Gaussian sampling and polynomial multiplication. The Gaussian sampling is either reduced via truncating [6], [7] or is completely replaced by a binary distribution sampler, which eliminates the need for a full multiplication [8]. The inherent error in the LWEbased schemes is also exploited via approximate multipliers for efficient R-LWE-based cryptosystems [9].…”
Section: Introductionmentioning
confidence: 99%
“…This work undertakes the approximation of discrete Gaussian distribution sampler in R-LWE by truncating its samples by three different levels. While the hardware resource consumption estimates after truncation are the same as described in earlier work AxRLWE [7], this work experimentally evaluates the truncated distribution properties and in comparison, benchmarks higher security estimates for the three truncation levels via the LWE Estimator [10]. In addition, an (upper bound of) probability of decryption failure of the approximated schemes is also provided for two parameter sets of medium security of R-LWE [2], [11].…”
Section: Introductionmentioning
confidence: 99%