Primitive RandBasis, introduced in (Cash and
al., 2010), is used to randomizes basis output by
ToBasis avoiding deterministic construction of
trapdoors. RandBasis outputs, from a given basis, a
new basis that is random with discrete Gaussian
random vectors. It relies on several (but bounded with
𝜎√(𝑚)) calls to Gaussian sampling until generating
a set of linearly independent vectors.
3.4 Performances Analysis
The main feature analyzed for performance analysis
is the timing of each primitive. Due to the huge size
of instances and the global computational complexity,
the performances are computed for a non-practical
(i.e., very low) security level (< 20 bits) with: 𝑑= 2,
𝑛 = 2 , 𝑘 = 2 , 𝑚 = 288 and 𝑞=
79466497377483581 . Illustrations for security
level > 80 bits leads to unpractical computational time
and memory sizes. The implementation run on an
Intel(R) Xeon(R) Platinum 8168 CPU @ 2.70GHz.
To get execution time, we took the average of the
times recorded on 50 executions for each primitive.
Table 4 below provides the execution time of all
primitives of the scheme. The primitives Derive,
KeyUp and DKGen are highly time consuming.
However, in real deployment, these primitives are
called sparsely during the operating lifetime of the
application. To highlight the bottlenecks leading to
such time performances, a specific look to Derive,
KeyUp, DKGen primitives shall be done.
Table 4: Execution of the main primitive of the scheme for
the security level of (< 20 bits) and 2 hierarchical levels.
Primitives Execution time
Setup
5s
Derive 𝑑 = 1
5min17
Derive 𝑑 = 2
10min19
KeyUp KGC
1min50
KeyUp 𝑑 = 1
6min44
DKGen 𝑑 = 2
5min11
Encrypt
15 ms
Decrypt
0.65 ms
For DKGen at the second level ( 𝑑 = 2), it
appears that the main bottlenecks are the following
(linear algebra and lattices) primitives: Inverse matrix
(25%), GSO (14.3%), HNF (42%) and Trapdoor
Generation (15.7%). By doing the same analysis on
other primitives such as KeyUp and Derive, GSO and
HNF also appears as the main and common
bottlenecks.
4 CONCLUSIONS
Post-quantum RHIBE are still heavy schemes, hard to
exploit except is some contexts such as cloud
computing. The proposed implementation provides a
complete parametrization strategy of a complex
scheme, the WZH+ in the ROM model, which is the
most efficient and compact post-quantum RHIBE
from today. The bottleneck (HNF) and critical
operations (such as GSO) require a specific attention
for performance issues. It exists acceleration strategy
that does not avoid the main issue regarding lattice-
based IBE: the size of the instances.
REFERENCES
Agrawal, S., Boneh, D., Boyen., X. (2010). Lattice basis
delegation in fixed dimension and shorter ciphertext
hierarchical IBE, In CRYPTO 2010.
Albrecht, R.M., Player, R., Scott, S. (2015). On the
concrete hardness of Learning with Errors, In Journal
of Mathematical Cryptology 2015. Related website:
https://lwe-estimator.readthedocs.io/en/latest/
Boldyreva, A., Goyal, V., Virendra., K. (2008). Identity-
based encryption with efficient revocation, In CCS’08.
Boneh, D., Franklin M. (2001). Identity-based encryption
from the Weil pairing, In CRYPTO 2001.
Cash, D., Hofheinz, D., Kiltz, E., Peikert, C. (2010). Bonsai
trees or how to delegate a lattice basis, In EUROCRYPT
2010.
Cocks, C. (2001). An identity based encryption scheme
based on quadratic residues, In Cryptography and
Coding 2001.
Ducas, L., Lyubachevsky, V., Prest, T.. (2014). Efficient
Identity-Based Encryption over NTRU Lattices, In
ASIACRYPT 2014.
Gentry, C., Silverberg, A. (2002). Hierarchical ID-Based
Cryptography, In ASIACRYPT 2002.
Gentry, C., Peikert, C., Vaikuntanathan, V. (2008).
Trapdoors for hard lattices and new cryptographic
constructions, In STOC’08.
Giraud, L., Langou, J., Rozloznik, M. The Loss of
Orthogonality in the Gram-Schmidt Orthogonalization
Process, In Computers & Mathematics with
Applications.
Hung, S., Rom, W.O. (1990). An application of the Hermite
normal form in integer programming, In Linear
Algebra and Its Applications.
Micciancio, D., Goldwasser, S. (2002). Complexity of
lattice problems: A cryptographic perspectives, In Book
2002.
Micciancio, D., Peikert, C. (2012). Trapdoors for Lattices:
Simpler, Tighter, Faster, Smaller, In EUROCRYPT
2012.
NIST. (2017). Requirements and Evaluation Criteria for the
PQC Standardization Process, In https://csrc.nist.gov/
Projects/post-quantum-cryptography.