An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method
Abstract
:1. Introduction
2. Related Work
3. Quantum Key Distribution (QKD) Solutions and Its Shortcomings
3.1. Quantum Key Exchange Protocols
3.2. Implementations
3.3. Protocol Security
- Without proper authentication, all quantum key exchange protocols are susceptible to man-in-the-middle attacks. Even with authentication, there remains a risk that an adversary may not be detected, appearing merely as noise in the system.
- Denial of service attacks are a risk for all quantum key exchange protocols since the communication channel can be disrupted by an adversary. Standard countermeasures like data copying and redundancy, which help preserve data integrity in traditional systems, are not applicable in quantum systems due to the need to maintain the integrity of the quantum state.
- Attacks exploiting the detection of measurement states are a concern, particularly in protocols like BB84 where polarizing filters are used. An attacker might use back-propagation techniques to determine the polarization axis, thereby predicting the quantum states being communicated [34].
- Quantum key exchange protocols that depend on random bit sequences can be compromised if the randomness source lacks sufficient entropy or predictability. Employing a hardware-based random number generator is a common countermeasure.
- Protocol-specific attacks also exist, such as the photon number-splitting (PNS) attack, which exploits photon generation devices that occasionally emit multiple photons with identical polarization. This allows an attacker to intercept photons without detection [35].
4. LWE Cryptosystem
4.1. Original LWE Technique
4.1.1. Basic Setup
- LWE Problem Definition: Given a vector in and a noisy inner product , where
- is a random vector from ;
- is a secret vector from ;
- e is a small error sampled from a discrete Gaussian distribution or another error distribution over ;
- q is a prime modulus.
- Search Problem: The goal of LWE is to find the secret vector given several pairs .
- Decision Problem: The decision version of LWE is to distinguish between pairs generated as described above and pairs where is uniformly random in .
4.1.2. LWE Encryption Scheme
- Key Generation:
- Choose a secret vector .
- The public key consists of several pairs where
- -
- is an matrix with entries from ;
- -
- ;
- -
- is a small error vector from a discrete Gaussian distribution.
- Encryption:
- To encrypt a bit ,
- -
- Choose a random binary vector .
- -
- Compute .
- -
- Compute .
- -
- The ciphertext is .
- Decryption:
- Given ciphertext ,
- -
- Compute .
- -
- If is closer to 0 than to , decrypt as 0; otherwise, decrypt as 1.
4.1.3. Security
4.2. Proposed LWE Cryptosystem
Algorithm 1 Encryption |
|
Algorithm 2 Decryption |
function Dec
|
4.3. Parameter Selection
- : This is to get from .In decryption, we have , then ; if , . Suppose that ; it might give because m is fragmented randomly. To get , it must compute , meaning , which will not give a correct . Therefore, m must be less than s.
- : This is to get from .Suppose that , so will not give exactly , which we need to extract and . The same thing occurs when computing ; it leads to setting .
- : This is to get r and from z.If , we cannot extract exactly , so z must be less than p in order to neglect , and it is enough to put .
- : This is to make sense for the modulus when calculating .If , b will be less than p because , so b will be exactly equal to without mod, which makes it more vulnerable, and the attacker might get one of these secret values due to modulus operation increasing the computational complexity.
4.4. Enc-Dec Correctness
- Since , ;
- Since , .
- .
4.5. Homomorphic Addition
5. Security Analysis and Performance
5.1. IND-CCA Security Definition
5.2. Security Game
- Setup:
- The challenger generates a key pair .
- The public key is given to the adversary.
- Phase 1 (Decryption Queries):
- The adversary can query the decryption oracle with any ciphertext c except for the challenge ciphertext .
- The oracle returns the plaintext m such that .
- Challenge:
- The adversary chooses two plaintexts m and .
- The challenger randomly selects a value and computes the challenge ciphertext .
- The challenge ciphertext is given to the adversary.
- Phase 2 (Decryption Queries):
- The adversary can continue to query the decryption oracle with any ciphertext c except .
- Guess:
- The adversary outputs a guess .
- The adversary wins if .
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Li, S.; Chen, Y.; Chen, L.; Liao, J.; Kuang, C.; Li, K.; Liang, W.; Xiong, N. Post-Quantum Security: Opportunities and Challenges. Sensors 2023, 23, 8744. [Google Scholar] [CrossRef]
- Kara, M.; Karampidis, K.; Sayah, Z.; Laouid, A.; Papadourakis, G.; Abid, M.N. A Password-Based Mutual Authentication Protocol via Zero-Knowledge Proof Solution. In Proceedings of the International Conference on Applied CyberSecurity, Dubai, United Arab Emirates, 29 April 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 31–40. [Google Scholar]
- Chait, K.; Kara, M.; Laouid, A.; Hammoudeh, M.; Bounceur, A. One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations. In Proceedings of the 7th International Conference on Future Networks and Distributed Systems, Dubai, United Arab Emirates, 21–22 December 2023; pp. 71–75. [Google Scholar]
- Medileh, S.; Kara, M.; Laouid, A.; Bounceur, A.; Kertiou, I. A Secure Clock Synchronization Scheme in WSNs Adapted for IoT-based Applications. In Proceedings of the 7th International Conference on Future Networks and Distributed Systems, Dubai, United Arab Emirates, 21–22 December 2023; pp. 674–681. [Google Scholar]
- Ajao, L.A.; Agajo, J.; Adedokun, E.A.; Karngong, L. Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry. J 2019, 2, 300–325. [Google Scholar] [CrossRef]
- Ananth, P.; Poremba, A.; Vaikuntanathan, V. Revocable cryptography from learning with errors. In Proceedings of the Theory of Cryptography Conference, Taipei, Taiwan, 29 November–2 December 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 93–122. [Google Scholar]
- Kuka, C.S.; Hu, Y.; Xu, Q.; Chandler, J.; Alkahtani, M. A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission. J 2021, 4, 764–783. [Google Scholar] [CrossRef]
- Topaloglu, R.O. Quantum logic locking for security. J 2023, 6, 411–420. [Google Scholar] [CrossRef]
- Gao, W.; Yang, L.; Zhang, D.; Liu, X. Quantum identity-based encryption from the learning with errors problem. Cryptography 2022, 6, 9. [Google Scholar] [CrossRef]
- Pouly, A.; Shen, Y. Provable dual attacks on learning with errors. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, 26–30 May 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 256–285. [Google Scholar]
- Montag, C.; Baumeister, H.; Kannen, C.; Sariyska, R.; Meßner, E.M.; Brand, M. Concept, possibilities and pilot-testing of a new smartphone application for the social and life sciences to study human behavior including validation data from personality psychology. J 2019, 2, 102–115. [Google Scholar] [CrossRef]
- Oh, E.N.; Baharon, M.R.; Yassin, S.; Idris, A.; MacDermott, A. Preserving data privacy in mobile cloud computing using enhanced homomorphic encryption scheme. J. Phys. Conf. Ser. 2022, 2319, 012024. [Google Scholar] [CrossRef]
- Baharon, M.R.; Shi, Q.; Llewellyn-Jones, D. A new lightweight homomorphic encryption scheme for mobile cloud computing. In Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK, 26–28 October 2015; pp. 618–625. [Google Scholar]
- Pang, H.; Wang, B. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Syst. J. 2020, 15, 3131–3141. [Google Scholar] [CrossRef]
- Mustafa, I.; Khan, I.U.; Aslam, S.; Sajid, A.; Mohsin, S.M.; Awais, M.; Qureshi, M.B. A lightweight post-quantum lattice-based RSA for secure communications. IEEE Access 2020, 8, 99273–99285. [Google Scholar] [CrossRef]
- Ishiguro, T.; Kiyomoto, S.; Miyake, Y.; Takagi, T. Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice. In Proceedings of the Public-Key Cryptography–PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Proceedings 17. Springer: Berlin/Heidelberg, Germany, 2014; pp. 411–428. [Google Scholar]
- Yu, Z.; Gao, C.z.; Jing, Z.; Gupta, B.B.; Cai, Q. A practical public key encryption scheme based on learning parity with noise. IEEE Access 2018, 6, 31918–31923. [Google Scholar] [CrossRef]
- Döttling, N.; Kolonelos, D.; Lai, R.W.; Lin, C.; Malavolta, G.; Rahimi, A. Efficient laconic cryptography from learning with errors. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23 April 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 417–446. [Google Scholar]
- Zheng, Z.; Wang, A.; Fan, H.; Zhao, C.; Liu, C.; Zhang, X. Scloud: Public key encryption and key encapsulation mechanism based on learning with errors. Cryptol. Eprint Arch. 2020. Available online: https://eprint.iacr.org/2020/095 (accessed on 3 August 2024).
- Dowerah, U.; Krishnaswamy, S. Towards an efficient LWE-based fully homomorphic encryption scheme. IET Inf. Secur. 2022, 16, 235–252. [Google Scholar] [CrossRef]
- Basso Basset, F.; Valeri, M.; Roccia, E.; Muredda, V.; Poderini, D.; Neuwirth, J.; Spagnolo, N.; Rota, M.B.; Carvacho, G.; Sciarrino, F.; et al. Quantum key distribution with entangled photons generated on demand by a quantum dot. Sci. Adv. 2021, 7, eabe6379. [Google Scholar] [CrossRef]
- Kara, M.; Karampidis, K.; Papadourakis, G.; Laouid, A.; AlShaikh, M. A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing. In Proceedings of the 2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), IEEE, Crete, Greece, 11–13 April 2023; pp. 59–66. [Google Scholar]
- Kara, M.; Laouid, A.; Bounceur, A.; Hammoudeh, M.; AlShaikh, M. Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key. J. Inf. Sci. Eng. 2023, 39, 183. [Google Scholar]
- Flamini, F.; Spagnolo, N.; Sciarrino, F. Photonic quantum information processing: A review. Rep. Prog. Phys. 2018, 82, 016001. [Google Scholar] [CrossRef]
- Pirandola, S. Composable security for continuous variable quantum key distribution: Trust levels and practical key rates in wired and wireless networks. Phys. Rev. Res. 2021, 3, 043014. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 10–12 December 1984; pp. 175–179. [Google Scholar]
- Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar] [CrossRef]
- Korzh, B.; Lim, C.C.W.; Houlmann, R.; Gisin, N.; Li, M.J.; Nolan, D.; Sanguinetti, B.; Thew, R.; Zbinden, H. Provably secure and practical quantum key distribution over 307 km of optical fibre. Nat. Photonics 2015, 9, 163–168. [Google Scholar] [CrossRef]
- Yin, J.; Cao, Y.; Li, Y.H.; Liao, S.K.; Zhang, L.; Ren, J.G.; Cai, W.Q.; Liu, W.Y.; Li, B.; Dai, H.; et al. Satellite-based entanglement distribution over 1200 kilometers. Science 2017, 356, 1140–1144. [Google Scholar] [CrossRef]
- Hiskett, P.A.; Rosenberg, D.; Peterson, C.G.; Hughes, R.J.; Nam, S.; Lita, A.; Miller, A.; Nordholt, J. Long-distance quantum key distribution in optical fibre. New J. Phys. 2006, 8, 193. [Google Scholar] [CrossRef]
- Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J.; et al. The SECOQC quantum key distribution network in Vienna. New J. Phys. 2009, 11, 075001. [Google Scholar] [CrossRef]
- Das, S.; Bäuml, S.; Winczewski, M.; Horodecki, K. Universal limitations on quantum key distribution over a network. Phys. Rev. X 2021, 11, 041016. [Google Scholar] [CrossRef]
- Jain, N.; Anisimova, E.; Khan, I.; Makarov, V.; Marquardt, C.; Leuchs, G. Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 2014, 16, 123030. [Google Scholar] [CrossRef]
- Brassard, G.; Lütkenhaus, N.; Mor, T.; Sanders, B.C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 2000, 85, 1330. [Google Scholar] [CrossRef]
- Fung, C.H.F.; Qi, B.; Tamaki, K.; Lo, H.K. Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A Atomic, Mol. Opt. Phys. 2007, 75, 032314. [Google Scholar] [CrossRef]
- Zhao, Y.; Fung, C.H.F.; Qi, B.; Chen, C.; Lo, H.K. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A At. Mol. Opt. Phys. 2008, 78, 042333. [Google Scholar] [CrossRef]
- Gerhardt, I.; Liu, Q.; Lamas-Linares, A.; Skaar, J.; Kurtsiefer, C.; Makarov, V. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2011, 2, 349. [Google Scholar] [CrossRef]
- Alamati, N.; Maram, V. Quantum CCA-Secure PKE, Revisited. In Proceedings of the IACR International Conference on Public-Key Cryptography, Sydney, Australia, 15–17 April 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 193–226. [Google Scholar]
- Cini, V.; Ramacher, S.; Slamanig, D.; Striecks, C. CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Seoul, Republic of Korea, 7–11 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 159–190. [Google Scholar]
- Zong, C. The Mathematical Foundation of Post-Quantum Cryptography. arXiv 2024, arXiv:2404.19186. [Google Scholar]
- Herrero-Collantes, M.; Garcia-Escartin, J.C. Quantum random number generators. Rev. Mod. Phys. 2017, 89, 015004. [Google Scholar] [CrossRef]
- Cao, Z.; Zhou, H.; Yuan, X.; Ma, X. Source-independent quantum random number generation. Phys. Rev. X 2016, 6, 011020. [Google Scholar] [CrossRef]
- Mannalatha, V.; Mishra, S.; Pathak, A. A comprehensive review of quantum random number generators: Concepts, classification and the origin of randomness. Quantum Inf. Process. 2023, 22, 439. [Google Scholar] [CrossRef]
- Subramaniyaswamy, V.; Jagadeeswari, V.; Indragandhi, V.; Jhaveri, R.H.; Vijayakumar, V.; Kotecha, K.; Ravi, L. Somewhat homomorphic encryption: Ring learning with error algorithm for faster encryption of IoT sensor signal-based edge devices. Secur. Commun. Netw. 2022, 2022, 2793998. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
integer rounded down | |
∘ | operation, namely “+” or “×” |
← | gets |
→ | gives |
· | scalar product |
random number generator | |
Encryption | |
Encryption | |
↚ | random value from |
/ | integer division that returns the quotient |
Parameter | Size (bit) | Condition | Satisfaction |
---|---|---|---|
m | 64 | / | / |
s | 128 | ||
e | 196 | ||
r | 32 | / | / |
p | 236 | ||
a | 267 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kara, M.; Karampidis, K.; Papadourakis, G.; Hammoudeh, M.; AlShaikh, M. An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method. J 2024, 7, 406-420. https://doi.org/10.3390/j7040024
Kara M, Karampidis K, Papadourakis G, Hammoudeh M, AlShaikh M. An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method. J. 2024; 7(4):406-420. https://doi.org/10.3390/j7040024
Chicago/Turabian StyleKara, Mostefa, Konstantinos Karampidis, Giorgos Papadourakis, Mohammad Hammoudeh, and Muath AlShaikh. 2024. "An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method" J 7, no. 4: 406-420. https://doi.org/10.3390/j7040024
APA StyleKara, M., Karampidis, K., Papadourakis, G., Hammoudeh, M., & AlShaikh, M. (2024). An Enhanced Learning with Error-Based Cryptosystem: A Lightweight Quantum-Secure Cryptography Method. J, 7(4), 406-420. https://doi.org/10.3390/j7040024