• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shen Shiyu, He Feng, Zhao Yunlei. Multi-Platform Efficient Implementation and Optimization of Aigis-enc Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2238-2252. DOI: 10.7544/issn1000-1239.2021.20210617
Citation: Shen Shiyu, He Feng, Zhao Yunlei. Multi-Platform Efficient Implementation and Optimization of Aigis-enc Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2238-2252. DOI: 10.7544/issn1000-1239.2021.20210617

Multi-Platform Efficient Implementation and Optimization of Aigis-enc Algorithm

Funds: This work was supported by the National Natural Science Foundation of China (U1536205, 61472084), the National Key Research and Development Program of China (2017YFB0802000), Shanghai Science and Technology Innovation Development Program (16DZ1100200), Shanghai Science and Technology Development Funds (16JC1400801), and the Key Research and Development Program of Shandong Province(2017CXG0701, 2018CXGC0701).
More Information
  • Published Date: September 30, 2021
  • The new challenges brought by the rapid development of quantum computing technology have made post-quantum cryptography (PQC) a hot research topic in the current cryptographic community. The Aigis-enc key encapsulation mechanism is a post-quantum cryptographic algorithm based on the asymmetric module learning with errors (A-MLWE) problem, which is one of the algorithms that won the first prizes of public key cryptographic algorithms in the National Cryptographic Algorithm Design Competition held by the Chinese Association for Cryptologic Research. In order to resist quantum attacks, maintain the long-term security of national cyberspace, and contribute to the development of future national PQC algorithm standards, it is important to optimize the excellent post-quantum cryptographic algorithms developed by Chinese scholars. In this paper, we focus on optimizing the Aigis-enc algorithm for different platforms, including fast parallel implementation for high-performance platforms and compact implementation for embedded low-power platforms. Specifically, we fully optimize the existing AVX2 implementation of Aigis-enc using single instruction multiple data stream (SIMD) instructions, and provide its first lightweight compact implementation for the ARM Cortex-M4 platform. Our implementation includes the following optimizations: reducing the number of assembly instructions for Montgomery and Barrett reduction to improve the efficiency of reduction; using number theoretic transformations with trimmed layers and optimized instruction pipelining to speed up polynomial multiplication and reduce the precomputed table storage; providing a parallel implementation of assembly instructions for polynomial serialization and deserialization to speed up the processes of encoding, decoding and encryption; combining on-the-fly computation and space multiplexing to optimize the algorithm storage space. The experimental results show that the proposed optimization techniques can improve the original AVX2 implementation of the Aigis-enc-768 algorithm by 25% on an 8-core Intel Core i7 processor, and significantly reduce its precomputed table storage, code size and stack usage on the ARM Cortex-M4 platform, which is of great practical importance for future deployment of the algorithm.
  • Related Articles

    [1]Xu Jingnan, Wang Leixia, Meng Xiaofeng. Research on Privacy Auditing in Data Governance[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202540530
    [2]Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing. Survey of Data Privacy Security Based on General Data Protection Regulation[J]. Journal of Computer Research and Development, 2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    [3]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [4]Chen Yufei, Shen Chao, Wang Qian, Li Qi, Wang Cong, Ji Shouling, Li Kang, Guan Xiaohong. Security and Privacy Risks in Artificial Intelligence Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2135-2150. DOI: 10.7544/issn1000-1239.2019.20190415
    [5]Liu Qiang, Li Tong, Yu Yang, Cai Zhiping, Zhou Tongqing. Data Security and Privacy Preserving Techniques for Wearable Devices: A Survey[J]. Journal of Computer Research and Development, 2018, 55(1): 14-29. DOI: 10.7544/issn1000-1239.2018.20160765
    [6]Wang Liang, Wang Weiping, Meng Dan. Privacy Preserving Data Publishing via Weighted Bayesian Networks[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353. DOI: 10.7544/issn1000-1239.2016.20160465
    [7]Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing. Research Advances on Big Data Security and Privacy Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151. DOI: 10.7544/issn1000-1239.2016.20160684
    [8]Meng Xiaofeng, Zhang Xiaojian. Big Data Privacy Management[J]. Journal of Computer Research and Development, 2015, 52(2): 265-281. DOI: 10.7544/issn1000-1239.2015.20140073
    [9]Liu Yahui, Zhang Tieying, Jin Xiaolong, Cheng Xueqi. Personal Privacy Protection in the Era of Big Data[J]. Journal of Computer Research and Development, 2015, 52(1): 229-247. DOI: 10.7544/issn1000-1239.2015.20131340
    [10]Zhang Fengzhe, Chen Jin, Chen Haibo, and Zang Binyu. Lifetime Privacy and Self-Destruction of Data in the Cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167.
  • Cited by

    Periodical cited type(5)

    1. 李宁,徐丽娜,方国勇,马英晋. 结合容错编码的量子化学分布式计算. 化学学报. 2024(02): 138-145 .
    2. 陈雨梁,林夕,李建华. 基于编码计算的分布式人工智能系统安全防护研究. 网络空间安全. 2024(01): 108-112 .
    3. 郭中孚,季新生,游伟,赵宇,巩小锐. 基于喷泉码的隐私保护编码计算卸载方法. 信息工程大学学报. 2024(05): 559-566 .
    4. 杨在航,李跃鹏,曾德泽. 基于编码计算的边端融合计算发展趋势. 自动化博览. 2023(02): 45-49 .
    5. 史洪玮,洪道诚,施连敏,杨迎尧. 异构编码联邦学习. 华东师范大学学报(自然科学版). 2023(05): 110-121 .

    Other cited types(5)

Catalog

    Article views (794) PDF downloads (249) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return