Abstract

Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions. The efficiency of public-key cryptography is strongly affected by the used number representations, as these systems are constructed from mathematically inspired problems to ensure security, and thus rely on operations over large integers. In this paper, unconventional representations systems, including the Residue Number System (RNS) and stochastic number representations, are systematically reviewed. Homomorphic representations, which allow for parties to operate on data without having access to their plaintext representation, are also considered. The main goal of this survey is to introduce the reader to key aspects of non-traditional number representations that may be exploited for public-key cryptography, without delving too much into the details. Examples of the methods and algorithms herein surveyed include subquadratic modular multiplication for isogeny-based cryptography, the acceleration of Goldreich-Goldwasser-Halevi (GGH) decryption by an order of magnitude, the improvement of the Direct Anonymous Attestation (DAA) protocol both in terms of storage requirements and the time taken to execute it, and efficient algorithm-hiding Fully Homomorphic Encryption (FHE). The implementation of this type of systems in both sequential and parallel platforms is analysed, and their performance is compared with traditional approaches. We hope this work sows the seed of further research on the application of non-positional number arithmetic to other cryptographic use-cases.

Highlights

  • Public-key cryptography has become the root of security on devices ranging from high-performance platforms to Internet of Things (IoT) systems with restricted capabilities [1]

  • RESEARCH This paper highlights the importance of investigating alternative number representations, like the Residue Number System (RNS), stochastic representations and homomorphisms, to achieve efficient, adaptable and secure emerging cryptosystems

  • While straightforward implementations of emerging cryptography would make use of binary representations, they would lead to long carry chains, precluding the exploitation of data parallelism, and multiplication algorithms of quadratic complexity

Read more

Summary

INTRODUCTION

Public-key cryptography has become the root of security on devices ranging from high-performance platforms to Internet of Things (IoT) systems with restricted capabilities [1]. There is an urgent need to develop novel arithmetic methods and algorithms supporting emerging cryptography, and achieve more efficient, secure and usable systems. It includes references to the Sections in which the representation systems are described, and where they are applied to public-key cryptographic schemes. Lattices are a recurrent topic throughout the article, being used to support the security of cryptosystems, and to aid the design of novel representation systems.

UNCONVENTIONAL NUMBER REPRESENTATIONS
RESIDUE NUMBER SYSTEM
STOCHASTIC COMPUTING
HOMOMORPHISMS
LATTICES
GGH CRYPTOSYSTEMS
RNS BASED ELLIPTIC CURVE AND ISOGENY CRYPTOGRAPHY
ELLIPTIC CURVE AND ISOGENY BASED CRYPTOGRAPHY
MODULAR MULTIPLICATION
STOCHASTIC COMPUTING FOR FHE
FULLY HOMOMORPHIC ENCRYPTION
STOCHASTIC COMPUTING BASED FHE
ADDITIVE HOMOMORPHISM AND DAA
Findings
CONCLUSIONS AND FUTURE RESEARCH
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call