A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice

Abstract

The purpose of this article is to extend the theory of circulant matrix to general ideal matrix, and to construct more general NTRU cryptosystem combined with the  φ-cyclic code. To understand our construction, first we discuss a more general form of the ordinary cyclic code, namely  φ-cyclic code, which firstly appeared in [1] and [2], thus we give a more generalized NTRUEncrypt by replacing finite field with real number field R.

Share and Cite:

Zheng, Z. , Liu, F. , Huang, W. , Xu, J. and Tian, K. (2022) A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice. Journal of Information Security, 13, 165-180. doi: 10.4236/jis.2022.133010.

1. Introduction

Lattice theory based cryptography is a representative technology of post quantum cryptography, which is recognized by the academic community as being able to resist quantum computing attacks. Cyclic code and the number theory research unit (NTRU) cryptosystem are two representatives of the post quantum cryptography. Both the two cryptosystems are based on the theory of circulant matrix. Cyclic code plays a central role in algebraic coding theory (see Chapter 6 of [3]). An important class of cyclic code named BCH code was discovered in 1960 [4]. After that, many other codes were developed based on cyclic code, such as polynomial code, Goppa code and so on [5]. The ϕ -cyclic code was firstly introduced in [1], which was applied to McEliece and Niederriter’s cryptosystems.

NTRU cryptosystem is a new public key cryptosystem based on lattice hard problem proposed in 1996 by three digit theorists Hoffstein, Piper and Silverman of Brown University in the United States [6]. Its main feature is that the key generation is very simple, and the encryption and decryption algorithm is much faster than the commonly used RSA and elliptic curve cryptography. In particular, NTRU can resist quantum computing attacks and is considered to be a potential public key cryptography that can replace RSA in the post quantum cryptography era. The essence of NTRU cryptographic design is the generalization of RSA on polynomials, so it is called the cryptosystem based on polynomial rings. However, NTRU can give a completely equivalent form by using the concept of q-ary lattice, so NTRU is also a lattice based cryptosystem.

Many researchers have presented some variations of NTRU by changing its algebraic structure. In 2002, Gaborit introduced an NTRU-like cryptosystem called CTRU by replacing the base ring of the NTRU with a polynomial ring over a binary field F 2 [ x ] [7]. They proved that their system is successfully decrypted. In 2005, Kouzmenko showed that CTRU is weak under a time attack and proposed the GNTRU cryptosystem based on Gaussian integers Z [ i ] [8]. In the same year, Coglianese introduced an analog to the NTRU cryptosystem called MaTRU [9]. MaTRU is based on a ring of all square matrices with polynomial entries. In 2009, Malekian introduced the QTRU cryptosystem based on quaternion algebra [10]. They also introduced the OTRU cryptosystem in 2010 based on Octonion algebra [11]. In 2016, Alsaidi proposed a public key cryptosystem BITRU based on binary algebra [12]. However, all of the above variations of NTRU have limitations. The purpose of this article is to extend the theory of circulant matrix to general ideal matrix, and to construct more general NTRU cryptosystem combined with the ϕ -cyclic code. The motivation of this research is to adapt the distributed scenario of blockchain architecture and apply the post quantum cryptography in it.

2. ϕ -Cyclic Code

Let F q be a finite field with q elements and q be a power of a prime number, F q [ x ] be the polynomial ring of F q with variable x . Let F q n be the n -dimensional linear space over F q , and a = ( a 0 , a 1 , , a n 1 ) F q n be a fixed vector in F q n with a 0 0 , the associated polynomial of a given by

ϕ ( x ) = ϕ a ( x ) = x n a n 1 x n 1 a 1 x a 0 F q [ x ] , a 0 0. (1.1)

Let ϕ ( x ) be the principal ideal generated by ϕ ( x ) in F q [ x ] . There is a one to one correspondence between F q n and the quotient ring R = F q [ x ] / ϕ ( x ) , given by

c = ( c 0 , c 1 , , c n 1 ) F q n c ( x ) = c 0 + c 1 x + + c n 1 x n 1 R . (1.2)

In fact, this correspondence is also an isomorphism of Abel groups. One may extend this correspondence to subsets of F q n and R by

C F q n C ( x ) = { c ( x ) | c C } R . (1.3)

If C F q n is a linear subspace of F q n of dimension k , then C is called a linear code in coding theory and written by C = [ n , k ] as usual. Each vector c = ( c 0 , c 1 , , c n 1 ) C is called a codeword of length n . Obviously, C = [ n , 0 ] and C = [ n , n ] are two trivial codes. Another one is called constant codes, which is almost trivial given by

C = { ( b , b , , b ) | b F q } , and C = [ n , 1 ] .

According to the given polynomial ϕ ( x ) = ϕ a ( x ) , we may define a linear transformation τ ϕ in F q n ,

τ ϕ ( c ) = τ ϕ ( ( c 0 , c 1 , , c n 1 ) ) = ( a 0 c n 1 , c 0 + a 1 c n 1 , , c n 2 + a n 1 c n 1 ) (1.4)

It is easily seen that τ ϕ : F q n F q n is a linear transformation.

Definition 1.1. Let C F q n be a linear code. It is called a ϕ -cyclic code, if

c C τ ϕ ( c ) C . (1.5)

In other words, a linear code C is a ϕ -cyclic code, if and only if C is closed under linear transformation τ ϕ . Clearly, if a = ( 1 , 0 , , 0 ) , and ϕ a ( x ) = x n 1 , then the ϕ -cyclic code is precisely the ordinary cyclic code (see Chapter 6 of [1]).

Remark The ϕ -cyclic code we give here is polycyclic code in fact, which firstly appeared in [1] [2], but we mainly concern for its application to McEliece and Niederriter’s cryptosystems. We first show that there is a one to one correspondence between ϕ -cyclic codes in F q n and ideals in R = F q [ x ] / ϕ ( x ) .

Theorem 1. Let C F q n be a subset, then C is a ϕ -cyclic code, if and only if C ( x ) is an ideal of R .

Proof: We use column notation for vector in F q n , then linear transformation τ ϕ may be written as

τ ϕ ( c 0 c 1 c n 1 ) = ( a 0 c n 1 c 0 + a 1 c n 1 c n 2 + a n 1 c n 1 ) , c = ( c 0 c 1 c n 1 ) F q n .

Let T ϕ be a n × n square matrix over F q ,

T ϕ = ( 0 0 a 0 a 1 I n 1 a n 1 ) F q n × n . (1.6)

where I n 1 is the ( n 1 ) × ( n 1 ) unit matrix. The matrix expression of τ ϕ as follows

τ ϕ ( c 0 c 1 c n 1 ) = T ϕ ( c 0 c 1 c n 1 ) = ( a 0 c n 1 c 0 + a 1 c n 1 c n 2 + a n 1 c n 1 ) . (1.7)

Suppose C F q n and C ( x ) is an ideal of R , it is clear that C is a linear code of F q n . To prove C is a ϕ -cyclic code, we note that for any polynomial c ( x ) C ( x ) , then x c ( x ) C ( x ) if and only if τ ϕ ( c ) C , namely, if c ( x ) C ( x ) , then

x c ( x ) C ( x ) τ ϕ ( c ) C T ϕ c C . (1.8)

Therefore, if C ( x ) is an ideal of R , then we have immediately that C is a ϕ -cyclic code of F q n .

Conversely, if C F q n is a ϕ -cyclic code, then for all k 1 , we have

c C T ϕ k c C , k 1.

It follows that

c ( x ) C ( x ) x k c ( x ) C ( x ) , 0 k n 1 ,

which implies C ( x ) is an ideal of R . This is the proof of Theorem 1.

By Theorem 1, to find a ϕ -cyclic code, it is enough to find an ideal of R . There are two trivial ideals C ( x ) = 0 and C ( x ) = R , the corresponding ϕ -cyclic codes are C = [ n , 0 ] and C = F q n respectively, which are called trivial ϕ -cyclic code. To find non-trivial ϕ -cyclic codes, we make use of homomorphic theorems, which is a standard technique in Algebra. Let π be the natural homomorphism from F q [ x ] to its quotient ring R = F q [ x ] / ϕ ( x ) , ker π = ϕ ( x ) ,

ϕ ( x ) N F q [ x ] π R = F q [ x ] / ϕ ( x ) , (1.9)

where N is an ideal of F q [ x ] , which is containing ker π = ϕ ( x ) . Since F q [ x ] is a principal ideal domain, then N = g ( x ) is a principal ideal generated by a monic polynomial g ( x ) F q [ x ] . It is easy to see that

ϕ ( x ) g ( x ) g ( x ) | ϕ ( x ) .

It follows that all ideals N satisfying (1.9) are given by

{ g ( x ) | g ( x ) F q [ x ] ismonicand g ( x ) | ϕ ( x ) } .

We write by g ( x ) mod ϕ ( x ) , the image of g ( x ) under π , it is easy to check

g ( x ) mod ϕ ( x ) = { h ( x ) g ( x ) | h ( x ) F q [ x ] and deg h ( x ) + deg g ( x ) < n } , (1.10)

more precisely, which is a representative elements set of g ( x ) mod ϕ ( x ) , by homomorphism theorem in ring theory, all ideals of R given by

{ g ( x ) mod ϕ ( x ) | g ( x ) F q [ x ] ismonicand g ( x ) | ϕ ( x ) } . (1.11)

Let d be the number of monic divisors of ϕ ( x ) in F q [ x ] , we can get the following corollary immediately.

Corollary 1. The number of ϕ -cyclic code in F q n is d .

To compare the ϕ -cyclic code and ordinary cyclic code, we see a simple example.

Example 1. Constant code C is always a cyclic code for 1 + x + + x n 1 | x n 1 , and its generated polynomial is just 1 + x + + x n 1 . But constant code C in F q n is not always a ϕ -cyclic code, it is a ϕ -cyclic code if and only if 1 + x + + x n 1 | ϕ ( x ) , an equivalent condition for 1 + x + + x n 1 | ϕ ( x ) is

a n 1 = a n 2 = = a 1 = b , and a 0 = 1 + b .

Definition 1.2. Let C be a ϕ -cyclic code and C ( x ) = g ( x ) mod ϕ ( x ) . We call g ( x ) is the generated polynomial of C , where g ( x ) is monic and g ( x ) | ϕ ( x ) .

Lemma 1.1. Let g ( x ) = g 0 + g 1 x + + g n k 1 x n k 1 + x n k be the generated polynomial of a ϕ -cyclic code C , where 1 k n 1 , and g ( x ) | ϕ ( x ) , then C = [ n , k ] and a generated matrix for C is the following block matrix

G = ( g τ ϕ ( g ) τ ϕ 2 ( g ) τ ϕ k 1 ( g ) ) k × n , (1.12)

where g = ( g 0 , g 1 , , g n k 1 , 1 , 0 , , 0 ) C is the corresponding codeword of g ( x ) , and τ ϕ i ( g ) = τ ϕ i 1 ( τ ϕ ( g ) ) for 1 i n 1 .

Proof: By assumption, C ( x ) = g ( x ) mod ϕ ( x ) , then { g , τ ϕ ( g ) , , τ ϕ k 1 ( g ) } C , we are to prove it is a basis of C . First, these vectors are linearly independent. Otherwise, we have

i = 0 k 1 b i τ ϕ i ( g ) = 0 , forsome b i F q , (1.13)

and the corresponding polynomial is zero, namely

( i = 0 k 1 b i x i ) g ( x ) = 0.

It follows that

i = 0 k 1 b i x i = 0 b i = 0 forall i , 0 i k 1.

Next, if c C , and c ( x ) C ( x ) , by (1.10), there is a polynomial b ( x ) = b 0 + b 1 x + + b k 2 x k 2 + x k 1 such that

c ( x ) = b ( x ) g ( x ) = ( i = 0 k 1 b i x i ) g ( x ) , where b k 1 = 1.

Thus we have the corresponding codeword of C ( x )

c = i = 0 k 1 b i τ ϕ i ( g ) .

This shows that { g , τ ϕ ( g ) , , τ ϕ k 1 ( g ) } is a basis of C , and a generated matrix for C is

G = ( g τ ϕ ( g ) τ ϕ 2 ( g ) τ ϕ k 1 ( g ) ) k × n .

We have lemma 1.1 at once.

To describe a parity check matrix for a ϕ -cyclic code, for any c = ( c 0 , c 1 , , c n 1 ) F q n , we write

c ¯ = ( c n 1 , c n 2 , , c 1 , c 0 ) F q n .

Lemma 1.2. Suppose C is a ϕ -cyclic code with generated polynomial g ( x ) , where g ( x ) | ϕ ( x ) and deg g ( x ) = n k . Let h ( x ) g ( x ) = ϕ ( x ) , where h ( x ) = h 0 + h 1 x + + h k 1 x k 1 + x k . Then a parity check matrix for C is

H = ( h ¯ τ ϕ ( h ¯ ) τ ϕ n k 1 ( h ¯ ) ) ( n k ) × n . (1.14)

Proof: Since h ( x ) g ( x ) = ϕ ( x ) , it means that h ( x ) g ( x ) = 0 in R = F q [ x ] / ϕ ( x ) , thus we have

g 0 h i + g 1 h i 1 + + g n k h i n + k = 0 , 0 i n 1.

It follows that G H = 0 , where G is a generated matrix for C given by (1.12). Therefore, H is a parity check matrix for C .

A separable polynomial in Algebra means that it has no multiple roots in its splitting field. The following lemma shows that there is a unit element in any non-zero ideal of R , when ϕ ( x ) is a separable polynomial.

Lemma 1.3. Suppose ϕ ( x ) is a separable polynomial of F q , and C ( x ) = g ( x ) mod ϕ ( x ) is an ideal of R with deg g ( x ) n 1 , then there exists an element d ( x ) C ( x ) such that

c ( x ) d ( x ) = c ( x ) , forall c ( x ) C ( x ) .

Proof: Let h ( x ) g ( x ) = ϕ ( x ) . Since ϕ ( x ) is a separable polynomial, then gcd ( g ( x ) , h ( x ) ) = 1 , and there are two polynomial a ( x ) and b ( x ) in F q [ x ] such that

a ( x ) g ( x ) + b ( x ) h ( x ) = 1.

Let

d ( x ) = a ( x ) g ( x ) = 1 b ( x ) h ( x ) C ( x ) .

If c ( x ) C ( x ) , by (1.10), we write c ( x ) = g ( x ) g 1 ( x ) , it follows that

c ( x ) d ( x ) a ( x ) g ( x ) g ( x ) g 1 ( x ) ( 1 b ( x ) h ( x ) ) g ( x ) g 1 ( x ) g ( x ) g 1 ( x ) c ( x ) ( mod ϕ ( x ) ) .

Thus we have c ( x ) d ( x ) = c ( x ) in R .

Next, we discuss maximal ϕ -cyclic code. Let C ( x ) = g ( x ) mod ϕ ( x ) , and g ( x ) be an irreducible polynomial in F q [ x ] , we call the corresponding ϕ -cyclic code C a maximal ϕ -cyclic code, because g ( x ) is a maximal ideal in F q [ x ] .

Lemma 1.4. Let C be a maximal ϕ -cyclic code with generated polynomial g ( x ) , β be a root of g ( x ) in some extensions of F q , then

C ( x ) = { a ( x ) | a ( x ) R and a ( β ) = 0 } . (1.15)

Proof: If a ( x ) C ( x ) , by (1.10) we have a ( β ) = 0 immediately. Conversely, if a ( x ) F q [ x ] and a ( β ) = 0 , since g ( x ) is irreducible, thus we have g ( x ) | a ( x ) , and (1.15) follows at once.

An important application of maximal ϕ -cyclic code is to construct an error-correcting code, so that we may obtain a modified McEliece-Niederriter’s cryptosystem. To do this, let 1 m < n , and F q m be an extension field of F q of degree m . Suppose F q m = F q ( θ ) , where θ is a primitive element of F q m and F q ( θ ) is the simple extension containing F q and θ . Let g ( x ) F q [ x ] be the minimum polynomial of θ , then g ( x ) is an irreducible polynomial of degree m of F q [ x ] . It is well-known that F q m is a Galois extension of F q , so that all roots of g ( x ) are in F q m . Let β 1 , β 2 , , β m be all roots of g ( x ) , the Vandermonde matrix V ( β 1 , β 2 , , β m ) defined by

H = V ( β 1 , β 2 , , β m ) = ( 1 β 1 β 1 2 β 1 n 1 1 β 2 β 2 2 β 2 n 1 1 β m β m 2 β m n 1 ) m × n , (1.16)

where β 1 = θ and each β i is a vector of ( F q ) m . For arbitrary monic polynomial h ( x ) F q [ x ] , deg h ( x ) = n m , let ϕ ( x ) = h ( x ) g ( x ) and C be a maximal ϕ -cyclic code generated by g ( x ) . It is easy to verify that

c C c H = 0.

Therefore, H is a parity check matrix for C . If we choose the primitive element θ , so that any d 1 columns in H are linearly independent, then the minimum distance of C is greater than d , and C is a t-error-correcting code, where t = [ d 2 ] .

The public key cryptosystems based on algebraic coding theory were created by R. J. McEliece [13] and H. Niederriter [14], a suitable t-error-correcting code plays a key role in their construction. The error-correcting code C should satisfy the following requirements:

1) C should have a relatively large error-correcting capability so that a reasonable number of message vectors can be used;

2) C should allow an efficient decoding algorithm so that the decryption can be carried out in a short time.

Our results supply a different way to choose an error-correcting code by selecting arbitrary irreducible polynomials g ( x ) F q [ x ] of degree m and roots of g ( x ) rather than an irreducible factor of x n 1 and the roots of unit such as ordinary BCH code and Gappa code.

In fact, for any positive integer m , there is at least an irreducible polynomial g ( x ) F q [ x ] with degree m . Let N q ( m ) be the number of irreducible polynomials of degree m in F q [ x ] , then we have (see Theorem 3.25 of [15])

N q ( m ) = 1 m d | m u ( m d ) q d = 1 m d | m u ( d ) q m d ,

where u ( d ) is Mobius function.

Assuming one has selected two monic and irreducible polynomials g ( x ) and h ( x ) with deg g ( x ) = m and deg h ( x ) = n m , let ϕ ( x ) = g ( x ) h ( x ) , then one may obtain ϕ -cyclic code C generated by g ( x ) or h ( x ) , which is more convenient and more flexible than the ordinary methods.

Remark It’s difficult to compare the error-correcting capability between ϕ -cyclic code with existing cyclic codes of the same length and dimension. However, we believe that the advantages of ϕ -cyclic code will become more clear when q increases. We will discuss this carefully in another paper later.

3. A Generalization of NTRUEncrypt

The public key cryptosystem NTRU proposed in 1996 by Hoffstein, Pipher and Silverman, is the fastest known lattice based encryption scheme, although its description relies on arithmetic over polynomial quotient ring Z [ x ] / x n 1 , it was easily observed that it could be expressed as a lattice based cryptosystem (see [16]). For the background materials, we refer to [3] [6] [17] [18] [19] and [20]. Our strategy in this section is to replace Z [ x ] / x n 1 by more general polynomial ring Z [ x ] / ϕ ( x ) and obtain a generalization of NTRUEncrypt, where ϕ ( x ) is a monic polynomial of degree n with integer coefficients.

In this section, we denote ϕ ( x ) and R by

ϕ ( x ) = x n a n 1 x n 1 a 1 x a 0 Z [ x ] , R = Z [ x ] / ϕ ( x ) , a 0 0. (2.1)

Let H ϕ Z n × n be a square matrix given by

H = H ϕ = ( 0 0 a 0 a 1 I n 1 a n 1 ) n × n , (2.2)

where I n 1 is ( n 1 ) × ( n 1 ) unit matrix. Obviously, ϕ ( x ) is the characteristic polynomial of H , and H defines a linear transformation of n n by x H x , where is real number field, x is a column vector of n . We may extend this transformation to 2 n and denote σ by

σ ( α β ) = ( H α H β ) , where ( α β ) 2 n . (2.3)

Of course, σ is again a linear transformation of 2 n 2 n .

According to [20], a q -ary lattice is a lattice L such that q Z n L Z n , where q is a positive integer.

Definition 2.1. A q -ary lattice L is called convolutional modular lattice, if L is in even dimension 2 n satisfying

( α β ) L σ ( α β ) = ( H α H β ) L . (2.4)

In other words, a convolutional modular lattice is a q -ary lattice in even dimension and is closed under the linear transformation σ .

Recalling the secret key ( f g ) of NTRU is a pair of polynomials of degree n 1 , we may regard f and g as column vectors in Z n . To obtain a convolutional modular lattice containing ( f g ) , we need some help of ideal matrices. An ideal matrix generated by a vector f is defined by

H * ( f ) = H ϕ * ( f ) = [ f , H f , H 2 f , , H n 1 f ] n × n , (2.5)

which is a block matrix in terms of each column H k f ( 0 k n 1 ) . It is easily seen that H * ( f ) is a generalization of the classical circulant matrices (see [21]), in fact, let ϕ ( x ) = x n 1 , and f ( x ) = f 0 + f 1 x + + f n 1 x n 1 Z [ x ] , the ideal matrix H ϕ * ( f ) generated by f is given by

H * ( f ) = H ϕ * ( f ) = ( f 0 f n 1 f 1 f 1 f 0 f 2 f n 1 f n 2 f 0 ) , ϕ ( x ) = x n 1 ,

which is known as a circulant matrix. On the other hand, ideal matrix and ideal lattice play an important role in Ajtai’s construction of a collision resistant Hash function, the related materials we refer to [3] [22] [23] [24] [25] and [26].

First, we have to establish some basic properties for an ideal matrix H * ( f ) , most of them are known when H * ( f ) is a circulant matrix.

Lemma 2.1. Suppose H and H * ( f ) are given by (2.2) and (2.5) respectively, then for any f n we have

H H * ( f ) = H * ( f ) H , f n .

Proof: Since ϕ ( x ) = x n a n 1 x n 1 a 1 x a 0 is the characteristic polynomial of H , by Hamilton-Cayley theorem, we have

H n = a 0 I n + a 1 H + + a n 1 H n 1 . (2.6)

Let

b = ( a 1 a 2 a n 1 ) , and H = ( 0 a 0 I n 1 b ) .

By (2.5) we have

H * ( f ) H = [ f , H f , , H n 1 f ] ( 0 a 0 I n 1 b ) = [ H f , H 2 f , , H n 1 f , a 0 f + a 1 H f + + a n 1 H n 1 f ] = [ H f , H 2 f , , H n 1 f , H n f ] = H [ f , H f , , H n 1 f ] = H H * ( f ) .

the lemma follows.

Lemma 2.2. For any f = ( f 0 f 1 f n 1 ) n we have

H * ( f ) = f 0 I n + f 1 H + + f n 1 H n 1 . (2.7)

Proof: We use induction on n to show this conclusion. If n = 1 , it is trivial. Suppose it is true for n , we consider the case of n + 1 . For this purpose, we write H = H n , e 1 , e 2 , , e n the n column vectors of unit in n , namely

e 1 = ( 1 0 0 ) , e 2 = ( 0 1 0 ) , , e n = ( 0 0 1 ) ,

and

H n + 1 = ( 0 A 0 e 1 H n ) ,

where A 0 = ( 0 , 0 , , a 0 ) n is a row vector. For any k , 1 k n 1 , it is easy to check that

H n e k = e k + 1 , H n k e 1 = e k + 1 and H n + 1 k = ( 0 A 0 H n k 1 e k H n k ) .

Let f = ( f 0 f 1 f n 1 f n ) n + 1 , we denote f by

f = ( f 1 f 2 f n ) n , and f = ( f 0 f ) .

By the assumption of induction, we have

H n * ( f ) = [ f , H n f , , H n n 1 f ] = f 1 I n + f 2 H n + + f n H n n 1 .

It follows that

H n + 1 * ( f ) = [ ( f 0 f ) , H n + 1 ( f 0 f ) , , H n + 1 n ( f 0 f ) ] = f 0 I n + f 1 H n + 1 + + f n H n + 1 n .

We complete the proof of lemma 2.2.

We always suppose that ϕ ( x ) Z [ x ] is a separable polynomial and w 1 , w 2 , , w n are complex number roots of ϕ ( x ) , of which are different from each other. The Vandermonde matrix V ϕ generated by { w 1 , w 2 , , w n } is

V ϕ = ( 1 1 1 w 1 w 2 w n w 1 n 1 w 2 n 1 w n n 1 ) , anddet ( V ϕ ) 0.

Lemma 2.3. Let f ( x ) = f 0 + f 1 x + + f n 1 x n 1 [ x ] , then we have

H * ( f ) = V ϕ 1 diag { f ( w 1 ) , f ( w 2 ) , , f ( w n ) } V ϕ , (2.8)

where diag { f ( w 1 ) , f ( w 2 ) , , f ( w n ) } is the diagonal matrix.

Proof: By Theorem 3.2.5 of [21], for H , we have

H = V ϕ 1 diag { w 1 , w 2 , , w n } V ϕ . (2.9)

By lemma 2.2, it follows that

H * ( f ) = V ϕ 1 diag { f ( w 1 ) , f ( w 2 ) , , f ( w n ) } V ϕ .

Now, we summarize some basic properties for ideal matrix as follows.

Theorem 2. Let f n , g n be two column vectors and H * ( f ) be the ideal matrix generated by f , then we have:

(i) H * ( f ) H * ( g ) = H * ( g ) H * ( f ) .

(ii) H * ( f ) H * ( g ) = H * ( H * ( f ) g ) .

(iii) det ( H * ( f ) ) = i = 1 n f ( w i ) .

(iv) H * ( f ) is an invertible matrix if and only if ϕ ( x ) and f ( x ) are coprime, i.e. gcd ( ϕ ( x ) , f ( x ) ) = 1 .

Proof: (i) and (ii) follow from lemma 2.2 immediately, (iii) and (iv) follow from lemma 2.3. Here we only give an equivalent form of (ii). Let

f g = H * ( f ) g . (2.10)

then by (ii) we have

H * ( f g ) = H * ( f ) H * ( g ) . (2.11)

To construct a convolutional modular lattice containing vector ( f g ) , let ( f g ) Z 2 n , ( H * ( f ) ) be the transpose of H * ( f ) , and

A = [ ( H * ( f ) ) , ( H * ( g ) ) ] = ( f f H f ( H ) 2 f ( H ) n 1 g g H g ( H ) 2 g ( H ) n 1 ) n × 2 n , (2.12)

A = ( H * ( f ) H * ( g ) ) = ( f H f H n 1 f g H g H n 1 g ) 2 n × n . (2.13)

We consider A and A as matrices over Z q , i.e. A Z q n × 2 n , A Z q 2 n × n , a q -ary lattice Λ q ( A ) is defined by (see [20])

Λ q ( A ) = { y Z 2 n | thereexists x Z n y A x ( mod q ) } . (2.14)

Under the above notations, we have

Theorem 3. For any column vectors f Z n and g Z n , then Λ q ( A ) is a convolutional modular lattice, and ( f g ) Λ q ( A ) .

Proof: It is known that Λ q ( A ) is a q -ary lattice, i.e.

q Z 2 n Λ q ( A ) Z 2 n .

We only prove that Λ q ( A ) is fixed under the linear transformation σ given by (2.4). If y Λ q ( A ) , then y A x ( mod q ) for some x Z n , by lemma 2.1, we have

σ ( y ) ( H H * ( f ) x H H * ( g ) x ) = ( H * ( f ) H x H * ( g ) H x ) A H x ( mod q ) .

It means that σ ( y ) Λ q ( A ) whenever y Λ q ( A ) . Let

e = ( 1 0 0 ) Z n H * ( f ) e = f , and H * ( g ) e = g .

We have ( f q ) Λ q ( A ) , and Theorem 3 follows.

Since Λ q ( A ) Z 2 n , then there is a unique Hermite Normal Form of basis N , which is an upper triangular matrix given by

N = ( I n H * ( h ) 0 q I n ) , where h ( H * ( f ) ) 1 g ( mod q ) . (2.15)

Next, we consider parameters system of NTRU. To choose the parameters of NTRU, let d f be a positive integer and { p , 0 , p } n Z n be a subset of Z n , of which has exactly d f + 1 positive entries and d f negative ones, the remaining n 2 d f 1 entries will be zero. We take some assumption conditions for choice of parameters as follows:

(i) ϕ ( x ) = x n a n 1 x n 1 a 1 x a 0 Z [ x ] with a 0 0 , and ϕ ( x ) is separable polynomial, n , p , q , d f are positive integers with n prime, 1 < p < q and gcd ( p , q ) = 1 .

(ii) f ( x ) and g ( x ) are two polynomials in Z [ x ] of degree n 1 , the constant term of f ( x ) is 1, and

f ( x ) 1 { p , 0 , p } n , g { p , 0 , p } n .

(iii) H * ( f ) is invertible modulo q .

(iv) d f < ( q 2 1 ) / 4 p 1 2 .

Under the above conditions, by lemma 2.2 we have

H * ( f ) I n ( mod p ) , and H * ( g ) 0 ( mod p ) . (2.16)

Now, we state a generalization of NTRU as follows.

· Private key. The private key in generalized NTRU is a short vector ( f q ) Z 2 n . The lattice associated with a private key is Λ q ( A ) , which is a convolutional modular lattice containing private key.

· Public key. The public key of the generalized NTRU is the HNF basis N of Λ q ( A ) , which is given by (2.15).

· Encryption. An input message is encoded as a vector m { 1 , 0 , 1 } n with exactly d f + 1 positive entries and d f negative ones. Here the reason for restricting d f + 1 positive and d f negative entries of vector m is to improve the efficiency of encryption and decryption and it’s not necessary. The vector m is concatenated with a randomly chosen vector r { 1 , 0 , 1 } n also with exactly d f + 1 positive entries and d f negative ones, to obtain a short error vector ( m r ) { 1 , 0 , 1 } 2 n . Let

( c 0 ) = N ( m r ) ( m + H * ( h ) r 0 ) ( mod q ) , (2.17)

where h is given by (2.15). Then, the n -dimensional vector c

c m + H * ( h ) r ( mod q ) ,

is the ciphertext.

· Decryption. Suppose the entries of n -dimensional vector c are belong to interval [ q 2 , q 2 ] , then ciphertext c is decrypted by multiplying it by the secret matrix H * ( f ) mod q , it follows that

H * ( f ) c H * ( f ) m + H * ( f ) H * ( h ) r H * ( f ) m + H * ( g ) r ( mod q ) . (2.18)

Here, we use the identity (ii) of Theorem 2, namely,

H * ( f ) H * ( g ) = H * ( H * ( f ) g ) .

If the above conditions (iv) is satisfied, it is easily seen that the coordinates of vector H * ( f ) m + H * ( g ) r are all bounded by q 2 in absolute value, or, with high probability, even for larger value of d f . The decryption process is completed by reducing (2.18) modulo p , to obtain

H * ( f ) m + H * ( g ) r m I n ( mod p ) .

Thus one gets plaintext m from ciphertext c .

Example 2. Let n = 3 , p = 3 , q = 7 , ϕ ( x ) = x 3 + x 2 + x + 1 , f ( x ) = 3 x 2 + 1 , g ( x ) = 3 x 2 , i.e. the private key is ( f g ) with f = ( 1 0 3 ) , g = ( 0 0 3 ) . It is easy to get

H * ( f ) = ( 1 3 3 0 2 0 3 3 1 ) , and H * ( g ) = ( 0 3 3 0 3 0 3 3 0 ) .

By (2.15), we compute the public key N as follows

h = ( 2 0 3 ) , H * ( h ) = ( 2 3 3 0 5 0 3 3 2 ) , and N = ( I 3 H * ( h ) 0 7 I 3 ) .

Assume the input message m = ( 1 0 0 ) , random vector r = ( 0 1 0 ) , by (2.17) we get the ciphertext

c m + H * ( h ) r ( 3 2 3 ) ( mod 7 ) .

By (2.18), we have

H * ( f ) c ( 2 3 0 ) ( mod 7 ) .

Since

( 2 3 0 ) ( 1 0 0 ) ( mod 3 ) ,

one can get the plaintext m = ( 1 0 0 ) from ciphertext c .

4. Conclusion

In this study, we first discuss a more general form of the ordinary cyclic code, namely ϕ -cyclic code. Then we give a generalized construction of NTRU based on ideal matrix and q-ary lattice theory. Compared with other variations of NTRU, such as CTRU, GNTRU, QTRU and BITRU, our extended NTRU cryptosystem is constructed with general ideal matrix rather than some special algebraic structures. Our purpose is to apply post quantum cryptography in distributed scenarios of blockchain future.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Lopez-Permouth, S.R., Parra-Avila, B.R. and Szabo, S. (2009) Dual Generalizations of the Concept of Cyclicity of Codes. Advances in Mathematics of Communications, 3, 227-234.
https://doi.org/10.3934/amc.2009.3.227
[2] Shi, M., Li, X., Sepasdar, Z. and Solé, P. (2020) Polycyclic Codes as Invariant Subspaces. Finite Fields and Their Applications, 68, Article ID: 101760.
https://doi.org/10.1016/j.ffa.2020.101760
[3] Lint, J.H.V. (1999) Introduction to Coding Theory. Volume 86 of GTM. Springer-Verlag, Berlin.
[4] Bose, R.C. and Ray-Chaudhuri, D.K. (1960) On a Class of Error Correcting Binary Group Codes. Information and Control, 3, 68-79.
https://doi.org/10.1016/S0019-9958(60)90287-4
[5] Goppa, V.D. (1970) A New Class of Linear Error-Correcting Codes. Problemy Peredachi Informatsii, 6, 24-30.
[6] Hoffstein, J., Pipher, J. and Silverman, J.H. (1998) NTRU: A Ring Based Public Key Cryptosystem. In: Buhler, J.P., Ed., Algorithmic Number Theory, Lecture Notes in Computer Science, Vol. 1423, Springer, Berlin, 267-288.
https://doi.org/10.1007/BFb0054868
[7] Gaborit, P., Ohler, J. and Soli, P. (2002) CTRU, a Polynomial Analogue of NTRU. Hal Inria, RR 4621.
[8] Kouzmenko, R. (2006) Generalizations of the NTRU Cryptosystem. Diploma Project, Ecole Polytechnique Federale de Lausanne.
[9] Coglianese, M. and Goi, B. (2005) MaTRU: A New NTRU Based Cryptosystem. Springer Verlag, Berlin, 232-243.
https://doi.org/10.1007/11596219_19
[10] Malecian, E., Zakerolhsooeini, A. and Mashatan, A. (2011) QTRU: A Lattice Attack Resistant Version of NTRU PCKS Based on Quaternion Algebra. The ISC Intrtnational Journal of Information Security, 3, 29-42.
[11] Malecian, E. and Zakerolhsooeini, A. (2010) OTRU: A Non-Associative and High Speed Public Key Cryptosystem. IEEE 15th CSI International Symposium on Computer Architecture and Digital Systems (CADS), Tehran, 23-24 September 2010, 83-90.
https://doi.org/10.1109/CADS.2010.5623536
[12] Alsaidi, M.G. and Yassein R. (2016) BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra. International Journal of Advanced Computer Science & Applications, 7, 1-6.
https://doi.org/10.14569/IJACSA.2016.071101
[13] Lyubashevsky, V. and Micciancio, D. (2006) Generalized Compact Knapsacks Are Collision Resistant. In: Bugliesi, M., Preneel, B., Sassone, V. and Wegener, I., Eds., Automata, Languages and Programming, Lecture Notes in Computer Science, Vol. 4052, Springer, Berlin, 144-155.
https://doi.org/10.1007/11787006_13
[14] Micciancio, D. and Regev, O. (2009) Lattice-Based Cryptography. In: Bernstein, D.J., Buchmann, J. and Dahmen, E., Eds., Post-Quantum Cryptography, Springer Berlin, 147-191.
https://doi.org/10.1007/978-3-540-88702-7_5
[15] Lidl, R. and Niederreiter, H. (1983) Finite Fields. In: Doran, R., Ismail, M., Lam, T.-Y. and Lutwak, E., Eds., Encyclopedia of Mathematics and Its Applications, Vol. 20, Cambridge University Press, Cambridge.
[16] IEEE Computer Society. (2000) IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000, 1-228.
[17] Coppersmith, D. and Shamir A. (1997) Lattice Attacks on NTRU. In: Fumy, W., Ed., Advances in Cryptology, Lecture Notes in Computer Science, Vol. 1233, Springer, Berlin, 52-61.
https://doi.org/10.1007/3-540-69053-0_5
[18] Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W. and Zhang, Z. (2017) Choosing Parameters for NTRUEncrypt. In: Handschuh, H., Ed., Topics in Cryptology, Lecture Notes in Computer Science, Vol. 10159, Springer, Berlin, 3-18.
https://doi.org/10.1007/978-3-319-52153-4_1
[19] McEliece, R.J. (1978) A Public-Key Cryptosystem Based on Algebraic Coding Theory. DSN Progress Report, Jet Propulsion Laboratory, Pasadena, 42-44.
[20] Micciancio, D. (2001) Improving Lattice Based Cryptosystems Using the Hermite Normal Form. In: Silverman, J.H., Ed., Cryptography and Lattices, Lecture Notes in Computer Science, Vol. 2146, Springer, Berlin, 126-145.
https://doi.org/10.1007/3-540-44670-2_11
[21] Davis, P.J. (1994) Circulant Matrices. 2nd Edition, Chelsea Publishing, New York.
[22] Ajtai, M. (1996) Generating Hard Instances of Lattice Problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, 22-24 May 1996, 99-108.
https://doi.org/10.1145/237814.237838
[23] Ajtai, M. and Dwork, C. (1997) A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence. Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, 4-6 May 1997, 284-293.
https://doi.org/10.1145/258533.258604
[24] Niederreiter, H. (1986) Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory, 15, 159-166.
[25] Plantard T. and Schneider, M. (2013) Creating a Challenge for Ideal Lattices. IACR Cryptology ePrint Archive, 39, 1-17.
[26] Pradhan, P.K., Rakshit, S. and Datta, S. (2019) Lattice Based Cryptography: Its Applications, Areas of Interest and Future Scope. Proceedings of the Third International Conference on Computing Methodologies and Communication, Erode, 27-29 March 2019, 988-993.
https://doi.org/10.1109/ICCMC.2019.8819706

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.