Positional Characteristics for Efficient Number Comparison over the Homomorphic Encryption
- Авторлар: Babenko M.1, Tchernykh A.2,3,4, Chervyakov N.1, Kuchukov V.1, Miranda-López V.2, Rivera-Rodriguez R.2, Du Z.5, Talbi E.6
-
Мекемелер:
- North-Caucasus Federal University
- CICESE Research Center
- Institute for System Programming of the Russian Academy of Sciences
- South Ural State University
- Tsinghua University
- Université de Lille
- Шығарылым: Том 45, № 8 (2019)
- Беттер: 532-543
- Бөлім: Article
- URL: https://journals.rcsi.science/0361-7688/article/view/177019
- DOI: https://doi.org/10.1134/S0361768819080115
- ID: 177019
Дәйексөз келтіру
Аннотация
Modern algorithms for symmetric and asymmetric encryptions are not suitable to
provide security of data that needs data processing. They cannot perform calculations
over encrypted data without first decrypting it when risks are high. Residue Number
System (RNS) as a homomorphic encryption allows ensuring the confidentiality of the
stored information and performing calculations over encrypted data without
preliminary decoding but with unacceptable time and resource consumption. An
important operation for encrypted data processing is a number comparison. In RNS, it
consists of two steps: the computation of the positional characteristic of the number
in RNS representation and comparison of its positional characteristics in the
positional number system. In this paper, we propose a new efficient method to compute
the positional characteristic based on the approximate method. The approximate method
as a tool to compare numbers does not require resource-consuming non-modular
operations that are replaced by fast bit right shift operations and taking the least
significant bits. We prove that in case when the dynamic range of RNS is an odd
number, the size of the operands is reduced by the size of the module. If one of the
RNS moduli is a power of two, then the size of the operands is less than the dynamic
range. We simulate proposed method in the ISE Design Suite environment on the FPGA
Xilinx Spartan-6 SP605 and show that it gains 31% in time and 37% in the area on
average with respect to the known approximate method. It makes our method efficient
for hardware implementation of cryptographic primitives constructed over a prime
finite field.
Авторлар туралы
M. Babenko
North-Caucasus Federal University
Хат алмасуға жауапты Автор.
Email: mgbabenko@ncfu.ru
Ресей, Stavropol
A. Tchernykh
CICESE Research Center; Institute for System Programming of the Russian Academy of Sciences; South Ural State University
Хат алмасуға жауапты Автор.
Email: chernykh@cicese.mx
Мексика, Ensenada; Moscow; Chelyabinsk
N. Chervyakov
North-Caucasus Federal University
Хат алмасуға жауапты Автор.
Email: ncherviakov@ncfu.ru
Ресей, Stavropol
V. Kuchukov
North-Caucasus Federal University
Хат алмасуға жауапты Автор.
Email: vkuchukov@ncfu.ru
Ресей, Stavropol
V. Miranda-López
CICESE Research Center
Хат алмасуға жауапты Автор.
Email: vmiranda@cicese.edu.mx
Мексика, Ensenada
R. Rivera-Rodriguez
CICESE Research Center
Хат алмасуға жауапты Автор.
Email: rrivera@cicese.mx
Мексика, Ensenada
Z. Du
Tsinghua University
Хат алмасуға жауапты Автор.
Email: duzh@tsinghua.edu.cn
ҚХР, Beijing
E.-G. Talbi
Université de Lille
Хат алмасуға жауапты Автор.
Email: el-ghazali.talbi@univ-lille.fr
Франция, Villeneuve d’Ascq
Қосымша файлдар
