Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Lattice-Based Public-Key Cryptography in HardwareDiscrete Gaussian Sampling

Lattice-Based Public-Key Cryptography in Hardware: Discrete Gaussian Sampling [In this chapter we propose an efficient hardware implementation of a discrete Gaussian sampler for ring-LWE encryption schemes. The proposed sampler architecture is based on the Knuth-Yao sampling Algorithm [10]. It has high precision and large tail-bound to keep the statistical distance below \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-90}$$\end{document} to the true Gaussian distribution for the secure parameter sets [6] that are used in the public key encryption schemes [12, 17].] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Lattice-Based Public-Key Cryptography in HardwareDiscrete Gaussian Sampling

Loading next page...
 
/lp/springer-journals/lattice-based-public-key-cryptography-in-hardware-discrete-gaussian-dLNnahFK49
Publisher
Springer Singapore
Copyright
© Springer Nature Singapore Pte Ltd. 2020
ISBN
978-981-32-9993-1
Pages
43 –63
DOI
10.1007/978-981-32-9994-8_4
Publisher site
See Chapter on Publisher Site

Abstract

[In this chapter we propose an efficient hardware implementation of a discrete Gaussian sampler for ring-LWE encryption schemes. The proposed sampler architecture is based on the Knuth-Yao sampling Algorithm [10]. It has high precision and large tail-bound to keep the statistical distance below \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-90}$$\end{document} to the true Gaussian distribution for the secure parameter sets [6] that are used in the public key encryption schemes [12, 17].]

Published: Nov 13, 2019

There are no references for this article.