TY - GEN
T1 - Efficient parallel evaluation of multivariate quadratic polynomials on GPUs
AU - Tanaka, Satoshi
AU - Chou, Tung
AU - Yang, Bo Yin
AU - Cheng, Chen Mou
AU - Sakurai, Kouichi
PY - 2012/1/1
Y1 - 2012/1/1
N2 - QUAD is a provably secure stream cipher, whose security is based on the hardness assumption of solving multivariate quadratic polynomial systems over a finite field, which is known to be NP-complete. However, such provable security comes at a price, and QUAD is slower than most other stream ciphers that do not have security proofs. In this paper, we discuss two efficient parallelization techniques for evaluating multivariate quadratic polynomial systems on GPU, which can effectively accelerate the QUAD stream cipher. The first approach focuses on formula of summations in quadratics, while the second approach uses parallel reduction to summations. Our approaches can be easily generalized and applied to other multivariate cryptosystems.
AB - QUAD is a provably secure stream cipher, whose security is based on the hardness assumption of solving multivariate quadratic polynomial systems over a finite field, which is known to be NP-complete. However, such provable security comes at a price, and QUAD is slower than most other stream ciphers that do not have security proofs. In this paper, we discuss two efficient parallelization techniques for evaluating multivariate quadratic polynomial systems on GPU, which can effectively accelerate the QUAD stream cipher. The first approach focuses on formula of summations in quadratics, while the second approach uses parallel reduction to summations. Our approaches can be easily generalized and applied to other multivariate cryptosystems.
UR - http://www.scopus.com/inward/record.url?scp=84906970691&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906970691&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-35416-8_3
DO - 10.1007/978-3-642-35416-8_3
M3 - Conference contribution
AN - SCOPUS:84906970691
SN - 9783642354151
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 28
EP - 42
BT - Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers
A2 - Lee, Dong Hoon
A2 - Yung, Moti
PB - Springer Verlag
T2 - 13th International Workshop on Information Security Applications, WISA 2012
Y2 - 16 August 2012 through 18 August 2012
ER -