Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (2): 64-76.doi: 10.11959/j.issn.2096-109x.2021026
• Topic: Integrated Circuit Hardware Security • Previous Articles Next Articles
Zhen ZHOU1,2, Debiao HE1,2, Min LUO1,2, Li LI1,2
Revised:
2021-01-09
Online:
2021-04-15
Published:
2021-04-01
Supported by:
CLC Number:
Zhen ZHOU, Debiao HE, Min LUO, Li LI. Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 64-76.
[1] | KELLY J , BARENDS R , FOWLER A G ,et al. State preservation by repetitive error detection in a superconducting quantum circuit[J]. Nature, 2015,519(7541): 66-69. |
[2] | SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Review, 1999,41(2): 303-332. |
[3] | 杨妍玲 . 后量子密码在信息安全中的应用与分析[J]. 信息与电脑(理论版), 2020,32(8): 177-181. |
YANG Y L . Application and analysis of post-quantum cryptography in information security[J]. Information and Computers (Theoretical), 2020,32(8): 177-181. | |
[4] | CHEN L , JORDAN S , LIU Y K ,et al. Report on post-quantum cryptography[M]. Maryland: National Institute of Standards and Technology, 2016. |
[5] | ALAGIC G , ALPERIN-SHERIFF J , APON D ,et al. Status report on the first round of the NIST post-quantum cryptography standardization process[M]. Maryland: National Institute of Standards and Technology, 2019. |
[6] | ROMA C A , TAI C A , HASAN M A . Energy consumption of round 2 submissions for NIST PQC standards[R]. Maryland:National Institute of Standards and Technology, 2019. |
[7] | 中国密码学会. 全国密码算法设计竞赛进入第2轮公钥算法[EB]. |
Chinese Association for Cryptologic Research. Public key scheme selected to the second-round competition of national cryptographic algorithm competition[EB]. | |
[8] | 中国密码学会. 关于全国密码算法设计竞赛算法评选结果的公示[EB]. |
Chinese Association for Cryptologic Research. Announcement of the selection results of the national cryptographic algorithm competition[EB]. | |
[9] | REGEV O . On lattices,learning with errors,random linear codes,and Cryptography[J]. Journal of the ACM (JACM), 2009,56(6): 1-40. |
[10] | AJTAI M , . Generating hard instances of lattice problems[C]// Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing. 1996: 99-108. |
[11] | LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[J]. Journal of the ACM (JACM), 2013,60(6): 1-35. |
[12] | 中国密码学会. 数字签名方案 Aigis-sig 算法提交文档[EB]. |
Chinese Association for Cryptologic Research. Submitted document of the digital signature scheme Aigis-sig[EB]. | |
[13] | NEJATOLLAHI H , DUTT N , RAY S ,et al. Software and hardware implementation of lattice-cased cryptography schemes[J]. University of California Irvine,CECSTR 17 4 (2017). |
[14] | DE C R , ROY S S , VERCAUTEREN F ,et al. Efficient software implementation of Ring-LWE encryption[C]// Proceedings of the Design,Automation & Test in Europe Conference & Exhibition (DATE′15). 2015. |
[15] | YUAN Y J , CHENG C M , KIYOMOTO S ,et al. Portable implementation of lattice-based cryptography using JavaScript[J]. International Journal of on Computing and Networking, 2016,6(3): 309-327. |
[16] | STEBILA D , MOSCA M . Post-quantum key exchange for the internet and the open quantum safe project[R]. Cryptology ePrint Archive, 2016. |
[17] | AGUILAR-MELCHOR C , BARRIER J , GUELTON S ,et al. NFLlib:NTT-based fast lattice library[C]// RSA Conference. 2016: 341-356. |
[18] | CHEN H , HAN K , HUANG Z ,et al. Simple encrypted arithmetic library - seal (v2.3)[R]. 2017. |
[19] | TTERT N , FELLER T , SCHNEIDER M ,et al. On the design of hardware building blocks for modern lattice-based encryption schemes[C]// Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES′12). 2012. |
[20] | P?PPELMANN T , GüNEYSU T , . Area optimization of lightweight Lattice-based encryption on reconfigurable hardware[C]// Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS′14). 2014. |
[21] | ROY S S , VERCAUTEREN F , MENTENS N ,et al. Compact ring-LWE cryptoprocessor[C]// Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES′14). 2014. |
[22] | BASU K , SONI D , NABEEL M ,et al. NIST post-quantum cryptography-a hardware evaluation study[C]// IACR Cryptology ePrint Archive. 2019:47. |
[23] | DANG V B , FARAHMAND F , ANDRZEJCZAK M ,et al. Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign[C]// 2019 International Conference on Field-Programmable Technology (ICFPT). 2019: 206-214. |
[24] | BANERJEE U , UKYAB T S , CHANDRAKASAN A P . Sapphire:a configurable crypto-processor for post-quantum Lattice-based protocols (Extended Version)[C]// IACR Crypto.ePrint Arch. 2019:1140. |
[25] | XIN G Z , HAN J , YIN T Y ,et al. VPQC:a domain-specific vector processor for post-quantum cryptography based on RISC-V architecture[J]. IEEE Transactions on Circuits and Systems I-regular Papers, 2020,67(8): 2672-2684. |
[26] | FENG X , LI S G , XU S F . RLWE-oriented high-speed polynomial multiplier utilizing multi-lane stockham NTT algorithm[J]. IEEE Transactions on Circuits and Systems Ⅱ:Express Briefs, 2019,99: 1. |
[27] | DU C H , BAI G Q . Towards efficient polynomial multiplication for Lattice-based cryptography[C]// 2016 IEEE International Symposium on Circuits and Systems (ISCAS). 2016: 1178-1181. |
[1] | Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN. Post-quantum encryption technology based on BRLWE for internet of things [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 140-149. |
[2] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[3] | Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN. Survey of code-based digital signatures [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 1-17. |
[4] | Yao LYU, Jinpeng HOU, Chong NIE, Mang SU, Bin WANG, Hongling JIANG. Partial blind signature scheme based on SM9 algorithm [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 147-153. |
[5] | Peijie LI, Li ZHANG, Yunfei XIA, Liming XU. Architecture design of re-configurable convolutional neural network on software definition [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 29-36. |
[6] | Jiana LIAN, Pengjun WANG, Gang LI, Xuejiao MA, Guanbao ZHAI. Novel hybrid strong and weak PUF design based on FPGA [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 94-103. |
[7] | Lixin MIAO,Qinrang LIU,Xin WANG. Software-defined protocol independent parser based on FPGA [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 70-76. |
[8] | Rongna XIE,Weihua MAO,Guozhen SHI. E-invoice authenticity verification scheme based on signature verification [J]. Chinese Journal of Network and Information Security, 2019, 5(6): 105-112. |
[9] | Chen GAO,Fan ZHANG. Survey of FPGA based recurrent neural network accelerator [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 1-13. |
[10] | Yu FU,Lianliang SUN,Xiaoping WU. QR code security management system based on WPKI and iris recognition [J]. Chinese Journal of Network and Information Security, 2018, 4(5): 62-68. |
[11] | Qing-xiao GUO,Da-wei ZHANG,Liang CHANG,Xiao-dong LIU,Jing-wen SONG. Design and implementation of proxy-protected proxy signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2017, 3(9): 47-54. |
[12] | Meng-li SHAO,Xin-chun YIN,Yan-mei LI. Implementation of SM3 algorithm based on SoPC component [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 47-53. |
[13] | Tian-han GAO,Yan-qiang LI. Survey on anonymous authentication mechanisms of VANET [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 10-16. |
[14] | Fang REN,Dong ZHENG,Jiu-lun FAN. Survey of digital signature technology based on error correcting codes [J]. Chinese Journal of Network and Information Security, 2016, 2(11): 1-10. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|