IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i5p728-d758412.html
   My bibliography  Save this article

R -LWE-Based Distributed Key Generation and Threshold Decryption

Author

Listed:
  • Ferran Alborch

    (Department of Mathematics, Campus Nord, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain
    Current affiliation: Applied Crypto Group, Orange Labs, 14000 Caen, France.
    Current affiliation: LTCI, Télécom Paris, Institut Polytechnique de Paris, 91120 Palaiseau, France.
    Current affiliation: LIRMM, Université de Montpellier, CNRS, 34095 Montpellier, France.)

  • Ramiro Martínez

    (Department of Mathematics, Campus Nord, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain)

  • Paz Morillo

    (Department of Mathematics, Campus Nord, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain)

Abstract

Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography. The most prominent field in post-quantum cryptography is lattice-based cryptography, protocols that are proved to be as difficult to break as certain hard lattice problems like Learning with Errors (LWE) or Ring Learning with Errors ( R -LWE). Furthermore, the application of cryptographic techniques to different areas, like electronic voting, has also nourished a great interest in distributed cryptography. In this work, we will give two original threshold protocols based in the lattice problem R -LWE: one for key generation and one for decryption. We will prove them both correct and secure under the assumption of hardness of some well-known lattice problems. Finally, we will give a rough implementation of the protocols in C to give some tentative results about their viability, in particular our model generates keys in the order of 10 3 ms and decrypts and encrypts in the order of 10 2 ms.

Suggested Citation

  • Ferran Alborch & Ramiro Martínez & Paz Morillo, 2022. "R -LWE-Based Distributed Key Generation and Threshold Decryption," Mathematics, MDPI, vol. 10(5), pages 1-31, February.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:5:p:728-:d:758412
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/5/728/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/5/728/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:5:p:728-:d:758412. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.