Content deleted Content added
→Parameter Choices: typo RWLE -> RLWE. |
→The Key Exchange: change the description based on Chris Peikert's method to the description of the general RLWE-KEX procedure. |
||
Line 40:
# Generate two small polynomials s<sub>R</sub>(x) and e<sub>R</sub>(x) by sampling from the distribution D.
# Compute '''v(x) =''' '''t<sub>I</sub>(x)·s<sub>R</sub>(x) + e<sub>R</sub>(x)''' ''Note that v(x) = a(x)s<sub>I</sub>(x)s<sub>R</sub>(x) + e<sub>I</sub>(x)s<sub>R</sub>(x) + e<sub>R</sub>(x) and that e<sub>R</sub>(x) + e<sub>I</sub>(x)s<sub>R</sub>(x) will be small because e<sub>R</sub>(x) was chosen to be small and the coefficients of e<sub>I</sub>(x)s<sub>R</sub>(x) will be bounded in their growth and still relatively small.''
#
# As '''v(x)''' and '''w(x)''' differ by small amount, a reconciliation information c is produced based on '''v(x)'''
# Respondent side's key stream u is calculated, based on the reconciliation information c and the polynomial '''v(x)'''.
# Compute t<sub>R</sub>(x) = a(x)·s<sub>R</sub>(x) + e<sub>R</sub>(x).
# The Respondent sends t<sub>R</sub>(x) and c to the Initiator.
'''Initiators Final Steps:'''
# Receive t<sub>R</sub>(x) and c from the Responder
# Compute '''w(x) = t<sub>R</sub>(x)·s<sub>I</sub>(x) + e<sub>I</sub>(x)''' = a(x)s<sub>I</sub>(x)s<sub>R</sub>(x) + e<sub>R</sub>(x)s<sub>I</sub>(x) + e<sub>I</sub>(x) ''Note that while this does not equal v(x) (above) the first term in the result a(x)s<sub>I</sub>(x)s<sub>R</sub>(x) equals the first term in v(x) and the other terms are all small. The
If the key exchange worked properly, the initiator's string: u<sub>n-1</sub>, ..., u<sub>0</sub> and the respondent's string: u<sub>n-1</sub>, ..., u<sub>0</sub> will be the same.▼
# Initiator side's key stream is produced from the reconciliation information c and polynomial '''w(x)'''.
Depending on the specifics of the parameters chosen n, q, σ, or b, there is an extremely small probability that this key exchange will fail to produce the same key. Parameters for the key exchange can be chosen to make the probability of failure in the key exchange very small; much less than the probability of undetectable garbles or device failures.▼
The methods of reconciliation and key string generation depends on the specific RLWE-KEX scheme in question. some method is based on modular arithmetic, while others may be based on high-dimension geometry. <ref name=":2"/><ref name=":3"/><ref name=":8"/>
▲If the key exchange worked properly, the initiator's string
▲Depending on the specifics of the parameters chosen
== Parameter Choices ==
|