Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

نویسندگان

چکیده

This paper examines the asymptotic performance of multiplication and cost quantum implementation for Naive schoolbook, Karatsuba, Toom-Cook methods in classical cases provides insights into roles post-quantum cryptography (PQC) era. Further, considering that lattice-based PQC algorithm is based on polynomial algorithms, including 4-way multiplier as its fundamental building block, we propose a higher-degree multiplier, 8-way which has lowest cost. Additionally, designed will include additional sub-operations to complete large integers order prevent side-channel attacks. To design our detail, employ detailed step computations such splitting, evaluation, point-wise multiplication, interpolation, recomposition, well several strategies reduce space time requirements. Existing multipliers are compared with 2-way, 4-way, designs. Our analysis or qubit count terms efficiency, n ( 15/8 ) log 15 /(2 log 15–log 8) log8 n asymptotically xmlns:xlink="http://www.w3.org/1999/xlink">O xmlns:xlink="http://www.w3.org/1999/xlink">1.245 ). The logical Toffoli counts bound at 112 xmlns:xlink="http://www.w3.org/1999/xlink">log8 15 – 128 depth xmlns:xlink="http://www.w3.org/1999/xlink">1– , close xmlns:xlink="http://www.w3.org/1999/xlink">1.0569 ), corresponds space- time-efficient multiplication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum and Post Quantum Cryptography

Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermined the security assumptions upon which currently used public key cryptographic algorithms are ba...

متن کامل

Quantum Learning Algorithms and Post-Quantum Cryptography

Quantum algorithms have demonstrated promising speed-ups over classical algorithms in the context of computational learning theory despite the presence of noise. In this work, we give an overview of recent quantum speed-ups, revisit the Bernstein-Vazirani algorithm in a new learning problem extension over an arbitrary cyclic group and discuss recent applications in cryptography, such as the Lea...

متن کامل

“ Post - Quantum Cryptography ”

1 Summary of the review In this review I present the book " Post-Quantum Cryptography ". This volume gives a detailed, technical-level treatment of the post-quantum cryptography universe. 2 Summary of the book When (if?) quantum computers of a big enough size will be available, most of the current public-key cryptography primitives based on number theory will be vulnerable. The " next generatio...

متن کامل

Cryptography from Post-Quantum Assumptions

In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a new notion of weakly Random-Self-Reducible public-key cryptosystem and show how it can be used to implement secure Oblivious Transfer. We also show that two recent (Post-quantum) cryptosystems can be considered as weakly RandomSelf-Reducible. We introduce a new problem called Isometric Lattice P...

متن کامل

Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography

Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p = 2 · 23 − 1 with b even, typically used in such cryptosystem. Our modular multiplication algorithm exploits the special structure present in such primes. We compare the effici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3252504