@inproceedings{48b3012dad9f465cb0b8a1050df7daad,
title = "Implementation and evaluation of improved Gaussian sampling for latice trapdoors",
abstract = "We report on our implementation of a new Gaussian sampling algorithm for lattice trapdoors. Lattice trapdoors are used in a wide array of lattice-based cryptographic schemes including digital signatures, attributed-based encryption, program obfuscation and others. Our implementation provides Gaussian sampling for trapdoor lattices with prime moduli, and supports both single- and multi-threaded execution. We experimentally evaluate our implementation through its use in the GPV hash-and-sign digital signature scheme as a benchmark. We compare our design and implementation with prior work reported in the literature. The evaluation shows that our implementation 1) has smaller space requirements and faster runtime, 2) does not require multi-precision floating-point arithmetic, and 3) can be used for a broader range of cryptographic primitives than previous implementations.",
keywords = "Digital signature, Gaussian sampling, Lattice-based cryptography, Ring-LWE, Trapdoor",
author = "G{\"u}r, {Kamil Doruk} and Yuriy Polyakov and Kurt Rohloff and Ryan, {Gerard W.} and Erkay Sava{\c s}",
note = "Funding Information: We would like to gratefully acknowledge helpful input and feedback from Daniele Micciancio, Nicholas Genise and Michael Walter of University of California San Diego. This work was sponsored by the Defense Advanced Research Projects Agency (DARPA) and the Army Research Laboratory (ARL) under Contract Numbers W911NF-15-C-0226 and W911NF-15-C-0233. The views expressed are those of the authors and do not necessarily reflect the official policy or position of the Department of Defense or the U.S. Government. The work was also sponsored by the National Security Agency under Grant H98230-15-1-0274. This research is based upon work supported in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA). The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either express or implied, of ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright annotation therein Publisher Copyright: {\textcopyright} 2018 Association for Computing Machinery.; 6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018 ; Conference date: 19-10-2018",
year = "2018",
month = oct,
day = "15",
doi = "10.1145/3267973.3267975",
language = "English (US)",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",
pages = "61--71",
booktitle = "WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018",
}