Improvement and Efficient Implementation of a LatticeBased Signature Scheme
Abstract
Latticebased signature schemes constitute an interesting alternative to RSA and discrete logarithm based systems which may become insecure in the future, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme [GPV08] combined with the trapdoor construction from Micciancio and Peikert [MP12] as it admits strong security proofs and is believed to be very efficient in practice. This paper confirms this belief and shows how to improve the GPV scheme in terms of space and running time and presents an implementation of the optimized scheme. A ring variant of this scheme is also introduced which leads to a more efficient construction. Experimental results show that GPV with the new trapdoor construction is competitive to the signature schemes that are currently used in practice.
Keywords
Latticebased cryptography Practicality Implementations1 Introduction
The security notion of most cryptographic applications changes in the presence of quantum computers. In the breakthrough work [Sho97] in 1994, Shor pointed out that cryptographic schemes with security based on the hardness of number theoretic assumptions can efficiently be attacked by quantum computers. Since then, many efforts have been spent on the search for alternatives in order to face this challenge. Latticebased cryptography is a promising candidate that has the potential to meet the security needs of future cryptographic applications. This is mainly due to Ajtai’s worstcase to averagecase reductions [Ajt96], which attracted a lot of researchers into the field of latticebased cryptography. Specifically, it states that attacking random instances of a cryptosystem is at least as hard as solving all instances of the underlying lattice problem. As opposed to the discrete log problem and factoring, lattice problems are conjectured to withstand quantum attacks. In the last couples of years, a number of efficient cryptosystems emerged that base the security on the hardness of wellstudied lattice problems. Unlike number theoretic constructions such as RSA, there exists no subexponential time attack on lattice problems up to date. All known attacks have exponential time complexity and thus serve as a further supporting argument for a replacement by latticebased cryptosystems. Based on this observation, one realizes an inherent need to develop new cryptographic primitives that can be based on worstcase lattice problems.
1.1 Our Contribution
In this paper we give the first software implementation of the GPV signature [GPV08] scheme using the newest trapdoor construction from Micciancio and Peikert [MP12]. Moreover, we present an efficient ring variant of the scheme based on the ringLWE problem. In addition, we propose improvements that lower the memory claims for the perturbation matrix by a factor of about 240 compared to the proposal in [MP12]. When generating signatures the perturbation matrix is required to sample integer vectors with a given covariance. In both variants the matrix and ring variant we considerably improved the running times of key and signature generation. For instance, the running times of key and signature generation are lowered by a factor of 30–190 respectively 2–6 in the ring variant. By providing running times, storage sizes and security levels for different parameter sets we show that the ring variant has a 3–6 times faster signature generation engine compared to the matrix variant. At the same time verification is about 3–9 times faster. Thus, we show that the proposed constructions are quite efficient and hence competitive regarding the performance.
1.2 Related Work
The construction of lattice based signature schemes appeared to be a big challenge up to the last couples of years. This is due to the absence of practical constructions enjoying provable security. First constructions, however, such as GGH [GGH97] and NTRU Sign [HHGP+03] were completely broken. This fundamentally changed in 2008 by introducing the GPV signature scheme by Gentry et al. [GPV08] and the one time signature LMOTS by Micciancio and Lyubashevsky [LM08]. The latter one operates in ideal lattices which allows for faster computations and smaller key sizes while providing provable security. When using Merkle Trees one can transform LMOTS into a full signature scheme. The subsequent works [Lyu08, Lyu09] build upon the one time signature scheme using the FiatShamir transform [FS87]. Recently, Lyubashevsky proposed an efficient construction [Lyu12] that performs very well on hardware [GLP12].
The hashandsign approach in turn was reconsidered in [GPV08] leading to constructions that admit security based on the hardness of the SIS Problem. Specifically, they aim at building a uniform random matrix \(\mathbf {A}\in \mathbb {Z}^{n\times m}\) endowed with a trapdoor \(\mathbf {S}\in \mathbb {Z}^{m\times m}\) in such a way that \(\mathbf {S}\) has small entries and \(\mathbf {A}\cdot \mathbf {S}\equiv 0 \ \mathrm{{mod}}\ q\) holds. By means of the secret matrix \(\mathbf {S}\) a signer can produce short preimages \(\mathbf {x}\) for the hash value \(H(\mu )\) of a message \(\mu \) to be signed such that \(\mathbf {A}\mathbf {x}\equiv H(\mu )\). The quality of the secret matrix immediately transfers to the quality of the signatures and hence plays a major role for assessing the security. Therefore, improving the algorithms for key generation is an ongoing research objective. Such constructions were considered for the first time in [Ajt99] and later on improved by [AP09, Pei10], but unfortunately they are inefficient and thus not suitable for practice. This is because the involved algorithms are complex and expensive in terms of space and runtime. However, Micciancio and Peikert recently proposed in [MP12] an elegant trapdoor construction which allows for fast signature generation while providing an improved output quality.
1.3 Organization
This paper is structured as follows. In Sect. 3 we introduce the GPV signature scheme together with the most recent trapdoor construction [MP12]. Furthermore, we provide a ring variant for this construction in Sect. 3.2. Section 4 contains a detailed description of our implementation and optimizations. In Sect. 5 we present the experimental results and their analysis.
2 Preliminaries
2.1 Notation
We will use the polynomial rings \(R = \mathbb {Z}[x]/\langle f(x) \rangle \) and \(R_q = \mathbb {Z}_q[x]/\langle f(x) \rangle \) such that \(f(x)\) is a monic and irreducible polynomial over \(\mathbb {Z}\) and \(q\) denotes the modulus. Throughout this paper we will mainly consider the case \(q=2^k,~ k > \mathbb {N}\). For the ringLWE problem we consider the cyclotomic polynomials, such as \(f(x) = x^n+1\) for \(n\) being a power of 2. The \(m\)th cyclotomic polynomial with integer coefficients is the polynomial of degree \(n=\phi (m)\) whose roots are the primitive \(m\)th roots of unity.
We denote ring elements by boldface lower case letters e.g. \(\mathbf {p}\), whereas for vectors of ring elements we use \(\hat{\mathbf {p}}\). For a vector \(\mathbf {v}\in \mathbb {R}^n\), a positive real \(s\), and a lattice \(\varLambda \subset \mathbb {R}^n\), let \(D_{\varLambda ,\mathbf {v},s}\) denote the \(n\)dimensional discrete Gaussian distribution over \(\varLambda \), centered at \(\mathbf {v}\), with parameter \(s\). For \(x\in \varLambda \), the distribution \(D_{\varLambda ,\mathbf {v},s}\) assigns the probability \( D_{\varLambda ,\mathbf {v},s}(\mathbf {x}) := \rho _{\mathbf {v},s}(\mathbf {x})/\sum \limits _{\mathbf {z}\in \varLambda } \rho _{\mathbf {v},s}(\mathbf {z})\) with \(\rho _{\mathbf {v}, s}(\mathbf {x}) =\exp \left( \pi \left\ \mathbf {x}\mathbf {v}\right\ ^2/s^2\right) \;.\) For brevity we write \(D_{\varLambda ,s}\) for \(D_{\varLambda ,\mathbf {0},s}\) and \(\rho _{s}\) for \(\rho _{\mathbf {0},s}\). Micciancio and Regev introduced the smoothing parameter in [MR04]:
Definition 1
For any \(n\)dimensional lattice \(\varLambda \) and positive real \(\epsilon > 0\), the smoothing parameter \(\eta _\epsilon (\varLambda )\) is the smallest real \(s > 0\) such that \(\rho _{1/s}(\varLambda ^*\backslash \{0\})\le \epsilon \)
The matrix \(\mathbf {\tilde{B}}\) stands for the GramSchmidt orthogonalized basis of the basis matrix \(\mathbf {B}\). And \(\Vert \mathbf {B}\Vert \) denotes the matrix norm of matrix \(\mathbf {B}\). By \([\mathbf {A}\mathbf {B}]\) we define the matrix obtained by the concatenation of the matrices \(\mathbf {A}\) and \(\mathbf {B}\).
3 Trapdoor Signatures
The signature scheme due to Gentry, Peikert and Vaikuntanathan [GPV08] consists mainly of sampling a preimage from a hash function featured with a trapdoor. The security of this construction is based on the hardness of \(\ell _{2}\)SIS. In [MP12] Micciancio and Peikert provide a new trapdoor notion that improved all relevant bounds of the previous proposals [Ajt99, AP09].
3.1 Description of the Matrix Version
Similar to the constructions of [Ajt99, AP09], the authors of [MP12] start with a uniform random matrix \(\mathbf {\bar{A}} \in \mathbb {Z}^{n\times \bar{m}}\) and extend it to a matrix \(\mathbf {A}=[\bar{\mathbf {A}}\mathbf {G}\mathbf {\bar{A}R}] \in \mathbb {Z}^{n\times m}\) via deterministic transformations [GPV08, MP12]. The main idea behind this proposal is to use a primitive matrix \(\mathbf {G}\in \mathbb {Z}^{n\times \omega }\), which has the property of generating \(\mathbb {Z}_q^n\) and for which one can easily sample preimages. Due to the nice structure of this matrix one can find a basis \(\mathbf {S} \in \mathbb {Z}^{\omega \times \omega }\) satisfying the congruence relation \(\mathbf {G}\cdot \mathbf {S} \equiv \mathbf {0} \ \mathrm{{mod}}\ q\).
 KeyGen(\(1^n\)) \(\rightarrow (\mathbf {A},\mathbf {R}):\)

Sample \(\bar{\mathbf {A}} \mathop {\leftarrow }\limits ^{\$}\mathbb {Z}^{n \times \bar{m}}_q \) and \( \mathbf {R}\mathop {\leftarrow }\limits ^{\$}D\) such that \(~\mathbf {R} \in \mathbb {Z}^{\bar{m} \times \lceil \log _2(q)\rceil \cdot n}\) and \(D\) (typically \(D_{\mathbb {Z}^{\bar{m} \times \lceil \log _2(q)\rceil \cdot n},\alpha q}\)) is a distribution which depends on the instantiation [MP12]. Output the signing key \(\mathbf {R}\) and the verification key \(\mathbf {A}=[\bar{\mathbf {A}}\mathbf {G}\mathbf {\bar{A}R}] \in \mathbb {Z}^{n \times m}_q\) where \(\mathbf {G}\) is a primitive matrix.
 Sign(\(\mu , \mathbf {R}\))\(\rightarrow \mathbf {x} \in \mathbb {Z}^m:\)

Compute the syndrome \(\mathbf {u}=H(\mu )\), sample \(\mathbf {p} \leftarrow D_{\mathbb {Z}^m, \sqrt{\mathbf {\Sigma _{p}}}}\) and determine the perturbed syndrome \(\mathbf {v}= \mathbf {u}\mathbf {A}\cdot \mathbf {p} \). Then sample \(\mathbf {z} \leftarrow D_{\varLambda ^{\perp }_\mathbf {v}(\mathbf {G}), r}\) with \(r\ge 2\cdot \sqrt{\ln (2n(1+\frac{1}{\epsilon }))/\pi }\). Compute \(\mathbf {x}=\mathbf {p}+\begin{bmatrix} \mathbf {R} \\ \mathbf {I} \end{bmatrix}\mathbf {z}\) and output the signature \(\mathbf {x}\).
 Verify(\(\mu ,\mathbf {x},(H,\mathbf {A})\)) \(\rightarrow \{0,1\}:\)

Check whether \(\mathbf {A}\cdot \mathbf {x}\equiv H(\mu )\) and \( \left\ \mathbf {x}\right\ _2 \le s \sqrt{m}\). If so, output \(1\) (accept), otherwise \(0\) (reject).
Sampling Algorithms for Preimages and Perturbations. In what follows we describe the preimage sampling algorithm for a syndrome \(t \in {\mathbb {Z}}_q\) from the coset \(\varLambda ^{\perp }_t({\mathbf {g}}^{\top })=\{{\mathbf {x}} ~~ {\mathbf {g}}^{\top } \cdot {\mathbf {x}} \equiv t \ \mathrm{{mod}}\ q \}\) using the randomized nearest plane algorithm [MP12]. Due to the nice properties of the orthogonalized basis, the algorithm reduces to a few steps with \(a_{0} = t\) :
 1.
\(v_{i} \leftarrow D_{2\mathbb {Z} + a_{i},r}\)
 2.
\(a_{i+1} = (a_{i}  v_{i})/2\)
The resulting vector is \(\mathbf {v} \in \varLambda ^{\perp }_t(\mathbf {g^{\top }})\) distributed as \(D_{\varLambda ^{\perp }_t(\mathbf {g^{\top }}),r}\). Of course, similarly one can sample preimages from \(\varLambda ^{\perp }_\mathbf {u}(\mathbf {G})\) for a syndrome vector \(\mathbf {u} \in \mathbb {Z}^n_q\) by independently running \(n\) instances of the algorithm on each component of \(\mathbf {u} \).
The authors provide two different types of instantiations for the trapdoor generation algorithm, namely the statistical and computational instantiation. Regarding the GPV signature scheme we used the latter one in our implementation because the dimension of \(\mathbf {A}\) is much smaller. Therefore, we will always refer to the computational instantiation in the rest of this work. Such a representation can easily be achieved by generating a uniform random matrix \(\mathbf {\tilde{A}} \in \mathbb {Z}^{n \times n}\) and sampling a trapdoor \(\mathbf {R}=\begin{bmatrix} \mathbf {R_1} \\ \mathbf {R_2} \end{bmatrix}\) from the discrete Gaussian distribution \(D_{\mathbb {Z}^{2n\times nk},\alpha q}\) where \(\alpha \in \mathbb {R}_{\small >0}\) satisfies \(\alpha q>\sqrt{n}\). The resulting matrix \([\bar{\mathbf {A}}\mathbf {G}(\mathbf {\tilde{A}}\mathbf {R_2}+\mathbf {R_1})]\) with \(\bar{\mathbf {A}}=[ \mathbf {I}_n  \mathbf {\tilde{A}}]\) is an instance of decision\(LWE_{n,\alpha ,q}\) and hence pseudorandom when ignoring the identity submatrix.
Applying the framework of [GPV08] requires to sample a spherically distributed preimage for a given syndrome \(\mathbf {u} \in \mathbb {Z}^n_q\) using Gaussian sampling algorithms and the trapdoor \(\mathbf {R}\). In fact, the spherical distribution is a common tool to make the distribution of the signature independent from the secret key. The Gaussian sampling algorithm mainly consists of two parts. The first part involves the trapdoor \(\mathbf {R}\) which is used to transform a sample \(\mathbf {x}\) from the set \(\varLambda _{\mathbf {u}}^{\perp }(\mathbf {G})\) with parameter \(r\ge \Vert \mathbf {\tilde{S}}\Vert \cdot \sqrt{\ln (2n(1+\frac{1}{\epsilon }))/\pi }\) to a sample \(\mathbf {y}=\begin{bmatrix} \mathbf {R} \\ \mathbf {I} \end{bmatrix} \cdot \mathbf {x}\) of the set \(\varLambda _\mathbf {u}^{\perp }(\mathbf {A})\). Due to the fact that \(\begin{bmatrix} \mathbf {R} \\ \mathbf {I} \end{bmatrix} \) is not a square matrix and the nonspherical covariance \(\mathsf {\mathbf {COV}}=r^2\begin{bmatrix} \mathbf {R} \\ \mathbf {I} \end{bmatrix}[\mathbf {R}^{T}~ \mathbf {I}]\) is not of fullrank, the distribution of \(\mathbf {y}\) is skewed and hence leaks information about the trapdoor. An attacker could collect samples and reconstruct the covariance matrix. Therefore, we need the second part to correct this flaw. This can be done by adding perturbations from a properly chosen distribution. Using the convolution technique from [Pei10], we can choose a parameter \(s\) in such a way that \(s^2\) is slightly larger than the largest absolute eigenvalue of the covariance \(\mathsf {\mathbf {COV}}\) and generate Gaussian perturbations \(\mathbf {p} \in \mathbb {Z}^m\) having covariance \(\mathbf {\Sigma _p} = s^2\mathbf {I}\mathbf {COV}\). In order to obtain a vector \(\mathbf {b}\) that is from a spherical Gaussian distribution with parameter \(s\), one samples a preimage \(\mathbf {y}\) for an adjusted syndrome \(\mathbf {v}=\mathbf {u}\mathbf {A}\mathbf {p}\) from \(\varLambda _{\mathbf {v}}^{\perp }(\mathbf {A})\). The vector \(\mathbf {b}=\mathbf {p}+\mathbf {y}\) provides a spherical distributed sample satisfying \(\mathbf {A}\mathbf {b}\equiv \mathbf {u} \ \mathrm{{mod}}\ q\).
Parameter sets with the corresponding estimated sublattice attack dimensions \(d\) and Hermite factors \(\delta \) according to [RS10].
\(n\)  \(128\)  \(128^{\star }\)  256  \(256^{\star }\)  284  \(284^{\star }\)  \(384\)  \(384^{\star }\)  \(484\)  \(484^{\star }\)  512  \(512^{\star }\)  1024  1024 

k  24  27  24  27  24  28  24  29  24  29  24  30  27  30 
\(m\)  3328  3712  6656  7424  7384  8520  9984  11136  12584  15004  13312  16384  29696  32768 
\(q\)  \(2^{24}\)  \(2^{27}\)  \(2^{24}\)  \(2^{27}\)  \(2^{24}\)  \(2^{29}\)  \(2^{24}\)  \(2^{29}\)  \(2^{24}\)  \(2^{29}\)  \(2^{24}\)  \(2^{30}\)  \(2^{27}\)  \(2^{30}\) 
\(d\)  324  346  586  659  650  758  838  1013  1057  1221  1118  1336  2305  2561 
\(\nu \)  4.8e5  5.4e5  1.3e6  1.5e6  1.6e6  1.8e6  2.5e6  3.0e6  3.5e6  4.3e6  3.9e6  4.8e6  1.2e7  1.3e7 
\(\delta \)  1.0203  1.0183  1.0117  1.0106  1.0108  1.0095  1.0085  1.0072  1.0070  1.0060  1.0067  1.0055  1.0034  1.0031 
\(\lambda ~\)bits  \({<}75\)  \({<}75\)  75  78  78  82  86  94  95  103  97  108  148  158 
Different to [MR08] the approach taken in [RS10] requires to determine the optimal subdimension \(d=\{x\in \mathbb {Z}~~ q^{2n/x}\le \nu \}\) of the matrix \(\mathbf {A}\) consisting of \(m\) columns and \(n\) rows. The lattice \(\varLambda ^{\perp }_q(\mathbf {A^{\prime }})\) generated by \(\mathbf {A^{\prime }}\) when leaving out \(md\) columns from \(\mathbf {A}\) has still determinant \(q^n\) with very high probability. This means that a solution \(\mathbf {v} \in \varLambda ^{\perp }_q(\mathbf {A^{\prime }})\) with \(\Vert \mathbf {v}\Vert \le \nu \) can easily be transformed to the vector \((\mathbf {v},\mathbf {0})\) such that \(\mathbf {A}\cdot (\mathbf {v},\mathbf {0})\equiv 0\ \mathrm{{mod}}\ q\) holds. For a given \(d\) we obtain the Hermite factor \(\delta =2^{n\cdot \log _2(q)/d^2}\) implying that a sufficiently good \(\mathsf{HSVP }\) solver can find vectors \(\mathbf {v} \in \varLambda ^{\perp }_q(\mathbf {A^{\prime }})\) bounded by \(q^{2n/d}\). From the Hermite factor one can compute the effort \(T(\delta )\) required to solve \(\delta \) HSVP according to [RS10, Conjecture 3]. Subsequently, one maps the result to the corresponding security levels (e.g. see [RS10, Table 2]).
3.2 The Ring Setting
In [MP12] the authors state that the construction can be adapted to the ring setting in such a way that the elements of the primitive vector \(\mathbf {g^{\top }}\) are considered as ring elements of \(R_q=\mathbb {Z}_q[X]/\phi _m(X)\) rather than \(\mathbb {Z}_q\), where \(\phi _m(X)\) is the \(m\)th cyclotomic polynomial. In the following section we present our construction of this idea and show that a polynomial matrix \(\hat{\mathbf {G}}\) as in the matrix case is indeed not needed. This results in a more efficient instantiation.
4 Improvements and Implementation Details
In our implementation we have to face several challenges that affect the performance of the signature scheme both in the matrix and ring variant. In the following sections we give a detailed description of our improvements and implementation results.
4.1 Computation of the Covariance matrix
4.2 Estimating the Parameter s
As in [MP12] one sets the parameter \(s\) large enough such that it is independent from a specific trapdoor. In particular, \(s\) is chosen to be not smaller than \(\sqrt{s_1(\mathbf {R})^2+1} \cdot \sqrt{6} \cdot a\), where \(s_1(\mathbf {R})\) denotes the largest singular value of the secret key \( \mathbf {R}\) and \(a\) is selected as above. The perturbation covariance matrix \(\mathbf {\Sigma _p}=s^2\mathbf {I}_m\mathbf {COV}\) is welldefined, if one selects \(s\) such that \(s > s_1(\begin{bmatrix} \mathbf {R} \\ \mathbf {I} \end{bmatrix})\cdot r\) is satisfied. Since \(\mathbf {R}\) is a subgaussian random variable, the matrix \(\mathbf {R}\) satisfies \(s_1(\mathbf {R})\le C\cdot (\sqrt{2n}+\sqrt{n\cdot k}+4.7)\cdot \alpha q\) except with probability \(\approx 2^{100}\) according to [MP12, Lemma 2.9]. The universal constant \(C\) is very close to \(1/\sqrt{2\pi }\).
4.3 Generation of Perturbation Vectors
One of the main ingredients of the signature scheme is the idea of creating perturbations [MP12] in order to get spherically distributed preimages that do not carry any information about the secret key. A perturbation vector is generated by means of the distribution \(D_{\mathbb {Z}^m, \sqrt{\mathbf {\Sigma _p}}}\) which outputs random vectors from \(\mathbb {Z}^m\) with covariance matrix \(\mathbf {\Sigma _p}\). By [Pei10] this can be achieved by sampling a vector \(\mathbf {p}\) according to \(\lceil \sqrt{\mathbf {\Sigma _p}a^2\mathbf {I}}\cdot D^m_1 \rfloor _a\), where \(D^m_{1}\) denotes the mdimensional Gaussian distribution. Each vector sampled from \(D^m_{1}\) has entries coming from the standard continuous Gaussian distribution with parameter 1. \(\lceil \cdot \rfloor _a\) denotes the randomized rounding operation from [Pei10] with parameter \(a=r/2 \ge \sqrt{\ln (2n(1+\frac{1}{\epsilon }))/\pi }\), which rounds each coordinate of the vector independently to a nearby integer using the discrete Gaussian distribution. The generation of perturbation vectors requires the square root computation \(\sqrt{\mathbf {\Sigma _p}a^2\mathbf {I}}\). Below we discuss one method for this purpose and provide improvements through a better analysis.
4.4 Square Root Computation
The Cholesky decomposition splits any positive definite matrix \(\mathbf {M}\) into the product of a lower triangular matrix and its conjugate transpose, i.e. \(\mathbf {M} = \mathbf {L}\cdot \mathbf {L}^{T}\), and runs in time \(O(m^3)=O((k+2)^3 n^3)\). If one selects \(k=19\), then the constant factor grows by 9261, which is very high compared to \(n=256\). The Cholesky decomposition is needed to generate perturbations that have covariance matrix \(\mathbf {\Sigma _p}\), where \(\sqrt{\mathbf {\Sigma _p}}\) is the Cholesky matrix. An algorithm for the Cholesky decomposition is shown in the Appendix A.2 (Algorithm 1). When decomposing the matrix \(\mathbf {\Sigma _p}a^2\mathbf {I}\) into its roots, one can improve the running time by our modified Cholesky decomposition taking into account the \(n^2k^2n\cdot k\) zero entries, meaning that one can skip line 8 in Algorithm 1 whenever \(l_{ik}\) or \(l_{jk}\) is known to be zero. Due to the sparsity of \(\mathbf {\Sigma _p}a^2\mathbf {I}\) this occurs very often. We call this optimized algorithm variant 1.
Although this optimization in variant 1 noticeably improves the timings of key generation, the algorithm is still inefficient and is the main source of slow key generation. Moreover, the resulting perturbation matrix is dense and has no structure, which leads to high memory claims in order to store the matrix of floating entries and to worse signature generation running times. This is due to the fact that each generation of a perturbation vector requires to multiply a huge triangular matrix consisting of multiprecision floating point entries with a floating point vector. To circumvent this problem we applied a pivoting strategy followed by the Block Cholesky decomposition, meaning that we permute the covariance matrix such that \(\mathbf {P}\mathbf {\Sigma _p} \mathbf {P}^{\top }=\mathbf {\Sigma ^{\prime }_p}\).
Lemma 1
Let the matrix Open image in new window be symmetric positive definite with \(b_i > 0\). Then the Schur complement \( \mathbf {S}_{i+1} := \mathbf {C}_{i}  \frac{1}{b_{i}} \mathbf {h}_{i}\mathbf {h}_{i}^{\top } \in \mathbb {R}^{mi1\times mi1}\) is welldefined and also symmetric positive definite.
4.5 Sampling
For sampling discrete Gaussian distributed integers in the key generation step we used the inversion transform method rather than rejection sampling because the number of stored entries is small and can be deleted afterwards. This improves the running times of the sampling step significantly. In particular, suppose the underlying parameter is denoted by \(s\). We precompute a table of cumulative probabilities \(p_t\) from the discrete Gaussian distribution with \(t \in \mathbb {Z}\) in the range \([\omega (\sqrt{\log n}) \cdot s, \omega (\sqrt{\log n}) \cdot s ]\). We then choose a uniformly random \(x \in [0,1)\) and find \(t\) such that \(x \in [p_{t1},p_t]\). This can be done using binary search. The same method is applied when sampling preimages from the set \(\varLambda _{\mathbf {u}}^{\perp }(\mathbf {G})\) with parameter \(r\). This parameter is always fixed and relatively small. Storing this table takes about 150 Bytes of memory. In this case signature generation is much faster than with simple rejection sampling. But, unfortunately, this does not apply in the randomized rounding step because the center always changes and thus involves a costly recomputation of tables after each sample. Therefore we used rejection sampling from [GPV08] instead. As for sampling continuous Gaussians with parameter \(t=1\), we used the Ziggurat algorithm [MT84] which is one of the fastest algorithms to produce continuous Gaussians. It belongs to the class of rejection sampling algorithms and uses precomputed tables. When operating with multiprecision vectors such as sampling continuous random vectors one should use at least \(\lambda \) bits of precision for a cryptographic scheme ensuring \(\lambda \) bits of security (e.g. 16 bytes floating points for \(\lambda =100\)).
4.6 Random Oracle Instantiation
We implemented the GPV signature scheme, the trapdoor generation and sampling algorithms in C using the Fast Library for Number Theory (FLINT 2.3) and the GNU Scientific Library (GSL 1.15). FLINT comprises different data types for matrices and vectors operating in residue classes such as \(\mathbb {Z}_q\) and \(\mathbb {Z}_q[X]\) whereas the GSL library provides a huge variety of mathematical tools from linear algebra, that can be applied on different primitive data types. We also included the Automatically Tuned Linear Algebra Software Library (ATLAS) which is an empirical tuning system that creates an individual BLAS (Basic Linear Algebra Subprograms) library on the target platform on which the library is installed on. Specifically, this library provides optimized BLAS routines which have a significant impact on the running times of the used mathematical operations in the key and signature generation steps. So it is always recommended to include this library whenever one has to work with GSL. For the representation of matrices in \(\mathbb {Z}^{n\times m}_q\) FLINT provides the data structure nmod_mat_t which comes into use in our implementation of the matrix version. Regarding the ring version, working with polynomials is performed by using the data structure nmod_poly_t. FLINT makes use of a highly optimised Fast Fourier Transform routine for polynomial multiplication and some integer multiplication operations.
5 Experimental Results
In this section we present our experimental results and compare the matrix version with the ring variant. Regarding the GPV signature scheme we used Construction 1 operating with a smaller number of polynomials compared to Construction 2. Hence, we obtain faster signature generation algorithms with a view to polynomial multiplication, generation of perturbations and sampling algorithms. We provide running times and file sizes of keys and signatures. The experiments were performed on a Sun XFire 4400 server with 16 QuadCore AMD Opteron(tm) Processor 8356 CPUs running at 2.3 GHz, having 64 GB of memory and running 64 bit Debian 6.0.6. We used only one core in our experiments. In most works private keys and signature sizes are estimated based on the underlying distributions ignoring the norm bound of the sampled vectors and thus lead to overestimations of signature sizes. By Lemma 2 we show that we can ignore the underlying distributions and focus solely on the norm bound. This allows us to give tighter bounds compared to previous proposals. For instance, in [Lyu12] signatures \(\mathbf {y} \in \mathbb {Z}^m\) are distributed as discrete Gaussians with standard deviation \(\sigma \). The estimated signature size is \(m \cdot \lceil \log _2(12 \cdot \sigma )\rceil \) bits (ignoring the norm bound). In our case signatures are distributed as discrete Gaussians with parameter \(s\) such that \(\left\ \mathbf {y}\right\ _2 < s \cdot \sqrt{m}\). Using Lemma 2 the bit size needed to represent \(\mathbf {y}\) is bounded by \(m \cdot (1+\lceil \log _2(s)\rceil )\) bits. The private key \(\mathbf {R} \in \mathbb {Z}^{2n\times n\cdot k}\) from Sect. 3.1 can be viewed as a vector \(\mathbf {r}\) with \(2n^2k\) entries such that \(\left\ \mathbf {r}\right\ _2< \alpha q \cdot \sqrt{2n^2k} \) by [Ban93, Lemma 1.5].
Lemma 2
Let \(\mathbf {v} \in \mathbb {Z}^n\) be a vector with \(\left\ \mathbf {v}\right\ _2 < b\cdot \sqrt{n}\). Then, the maximum number of bits required to store this vector is bounded by \(n \cdot (1+\lceil \log _2(b)\rceil )\).
Experimental results for the matrix and ring variant. By \(\uparrow \) we mean that the factor grows as \(n\) increases.

Comparison of different signature schemes.
Scheme  Security level  Sizes [kB]  Running times [ms]  

Public key  Secret key  Signature  Signing  Verification  
GPV Ring  \({\approx }90\)  37.5  21.3  26.8  27  3 
(n=512, k=24)  
GPV Ring  \({\approx }100\)  47.3  23.9  30.1  31  4 
(n=512, k=27)  
80  12.8  12.9  8.1  40.7  5.6  
(n=512)  
LyuSig [GOPS13]  100  1.5  0.3  1.2  0.3  0.02 
(n=512)  
80  36  0.05  25  32  23  
(rounds=140)  
80  36  0.05  25  31  24  
(rounds=140)  
RSA 2048  112  0.3  2  0.3  5.0  0.05 
RSA 4096  \(\ge 128\)  0.5  4  0.5  27.5  0.14 
DSA 2048  112  0.3  0.02  0.04  0.7  0.8 
ECDSA 233  112  0.06  0.09  0.06  7  3.5 
ECDSA 283  128  0.07  0.11  0.07  11.5  6.5 
Table 5 in the Appendix A.4 depicts the sizes of signatures, secret and public keys of the most recent latticebased signature schemes at a glance. A look to this table reveals that the storage sizes of the GPV signature scheme are still large compared to [Lyu12, GLP12]. When comparing our scheme with the ring equivalent of \(l_2\)SIS, one observes that the public key and signature sizes are about 30% higher. The secret key sizes of our implementation are even higher if one stores the perturbation matrix and does not create it for each signature (see Table 2). The optimizations due to [GLP12] furtherly improve the sizes of [Lyu12] by using more aggressive parameters. In [DDLL13] Ducas et al. present a novel signature scheme that benefits from a highly efficient bimodal discrete Gaussian sampler and a modified scheme instantiation compared to [Lyu12, GLP12]. Furthermore, they provide a scheme variant that allows key generation to be performed in a NTRUlike manner. The corresponding sizes of keys and signatures for BLISS providing 128 bits of security are also depicted in Table 5.
Notes
Acknowledgements
We would like to thank Chris Peikert and Özgür Dagdelen for the fruitful discussions as well as the reviewers of SAC. The work presented in this paper was performed within the context of the Software Campus project ITGiKo. It was funded by the German Federal Ministry of Education and Research (BMBF).
References
 [ACPS09]Applebaum, B., Cash, D., Peikert, Ch., Sahai, A.: Fast cryptographic primitives and circularsecure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595–618. Springer, Heidelberg (2009) CrossRefGoogle Scholar
 [ADV+12]El Yousfi Alaoui, S.M., Dagdelen, Ö., Véron, P., Galindo, D., Cayrel, P.L.: Extended security arguments for signature schemes. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 19–34. Springer, Heidelberg (2012) CrossRefGoogle Scholar
 [Ajt96]Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: 28th Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM, May 1996Google Scholar
 [Ajt99]Ajtai, M.: Generating hard instances of the short basis problem. In: Wiedermann, J., Van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 1–9. Springer, Heidelberg (1999) Google Scholar
 [AP09]Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS, vol. 3 of LIPIcs, pp. 75–86. Schloss Dagstuhl  LeibnizZentrum fuer Informatik, Germany (2009)Google Scholar
 [Ban93]Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Math. Ann. 296(4), 625–635 (1993)CrossRefMATHMathSciNetGoogle Scholar
 [BDK+07]Buchmann, J., Dahmen, E., Klintsevich, E., Okeya, K., Vuillaume, C.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 31–45. Springer, Heidelberg (2007) Google Scholar
 [BLP+13]Brakerski, Z., Langlois, A., Peikert, C., Regev, O., Stehlé, D.: Classical hardness of learning with errors. In: STOC (2013)Google Scholar
 [BPR12]Banerjee, A., Peikert, Ch., Rosen, A.: Pseudorandom functions and lattices. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 719–737. Springer, Heidelberg (2012) CrossRefGoogle Scholar
 [DD12]Ducas, L., Durmus, A.: RingLWE in polynomial rings. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 34–51. Springer, Heidelberg (2012)Google Scholar
 [DDLL13]Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal Gaussians. Cryptology ePrint Archive, Report 2013/383. http://eprint.iacr.org/2013/383 (2013)
 [FS87]Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987) Google Scholar
 [GGH97]Goldreich, O., Goldwasser, S., Halevi, S.: Publickey cryptosystems from lattice reduction problems. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112–131. Springer, Heidelberg (1997) Google Scholar
 [GLP12]Güneysu, T., Lyubashevsky, V., Pöppelmann, T.: Practical latticebased cryptography: a signature scheme for embedded systems. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 530–547. Springer, Heidelberg (2012) Google Scholar
 [GOPS13]Güneysu, T., Oder, T., Pöppelmann, T., Schwabe, P.: Software speed records for latticebased signatures. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 67–82. Springer, Heidelberg (2013) Google Scholar
 [GPV08]Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Ladner, R.E., Dwork, C. (eds.) 40th Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM, May 2008Google Scholar
 [HHGP+03]Hoffstein, J., HowgraveGraham, N., Pipher, J., Silverman, J.H., Whyte, W.: NTRUsign: digital signatures using the NTRU lattice. In: Joye, M. (ed.) CTRSA 2003. LNCS, vol. 2612, pp. 122–140. Springer, Heidelberg (2003) Google Scholar
 [Lar12]Larson, R.: Brief Calculus: An Applied Approach, vol. 9. (2012)Google Scholar
 [LM08]Lyubashevsky, V., Micciancio, D.: Asymptotically efficient latticebased digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37–54. Springer, Heidelberg (2008) Google Scholar
 [LPR10]Lyubashevsky, V., Peikert, Ch., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010) CrossRefGoogle Scholar
 [LPR13]Lyubashevsky, V., Peikert, Ch., Regev, O.: A toolkit for ringLWE cryptography. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 35–54. Springer, Heidelberg (2013) CrossRefGoogle Scholar
 [Lyu08]Lyubashevsky, V.: Towards practical latticebased cryptography (2008)Google Scholar
 [Lyu09]Lyubashevsky, V.: Fiatshamir with aborts: applications to lattice and factoringbased signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598–616. Springer, Heidelberg (2009) CrossRefGoogle Scholar
 [Lyu12]Lyubashevsky, V.: Lattice signatures without trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738–755. Springer, Heidelberg (2012) CrossRefGoogle Scholar
 [Mic07]Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Comput. Complex. 16(4), 365–411 (2007)CrossRefMATHMathSciNetGoogle Scholar
 [MP12]Micciancio, D., Peikert, Ch.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700–718. Springer, Heidelberg (2012) CrossRefGoogle Scholar
 [MR04]Micciancio, D., Regev, O.: Worstcase to averagecase reductions based on Gaussian measures. In: 45th Annual Symposium on Foundations of Computer Science, pp. 372–381. IEEE Computer Society, October 2004Google Scholar
 [MR08]Micciancio, D., Regev, O.: Latticebased cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) PostQuantum Cryptography, pp. 147–191. Springer, Heidelberg (2008)Google Scholar
 [MT84]Marsaglia, G., Tsang, W.: A fast, easily implemented method for sampling from decreasing or symmetric unimodal density functions. SIAM J. Sci. Stat. Comput. 5(2), 349–359 (1984)CrossRefMATHMathSciNetGoogle Scholar
 [Pei10]Peikert, Ch.: An efficient and parallel Gaussian sampler for lattices. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 80–97. Springer, Heidelberg (2010) CrossRefGoogle Scholar
 [RS10]Rückert, M., Schneider, M.: Estimating the security of latticebased cryptosystems. http://eprint.iacr.org/2010/137 (2010)
 [Sho97]Shor, P.W.: Polynomialtime algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)CrossRefMATHMathSciNetGoogle Scholar
 [SSTX09]Stehlé, D., Steinfeld, R., Tanaka, K., Xagawa, K.: Efficient public key encryption based on ideal lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 617–635. Springer, Heidelberg (2009) CrossRefGoogle Scholar
 [Ste94]Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994) Google Scholar
 [V97]Vron, P.: Improved identification schemes based on errorcorrecting codes. Appl. Algebra Eng. Commun. Comput. 8, 57–69 (1997)CrossRefGoogle Scholar
 [WHCB13]Weiden, P., Hülsing, A., Cabarcas, D., Buchmann, J.: Instantiating treeless signature schemes. IACR Cryptology ePrint Archive (2013)Google Scholar
 [Zha10]Zhang, F.: The Schur Complement and its Applications, vol. 4. Springer, New York (2010)Google Scholar