TY - JOUR
T1 - Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation
AU - Wu, Hao-Tian
AU - Cheung, Yiu-ming
AU - Tian, Zhihong
AU - Liu, Dingcai
AU - Luo, Xiangyang
AU - Hu, Jiankun
N1 - Funding information:
This work was supported in part by the National Key Research and Development Program of China under Grant 2023YFE0202700; in part by the Natural Science Foundation of Guangdong Province of China under Grant 2021A1515011798; in part by NSFC under Grant 62372129, Grant U20B2046, and Grant 62172435; in part by ARC Discovery Program under Grant DP190103660 and Grant DP200103207; in part by ARC Linkage Program under Grant LP180100663; in part by the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness under Grant HNTS2022017; in part by NSFC/Research Grants Council (RGC) Joint Research Scheme under Grant N_HKBU214/21; in part by the General Research Fund of RGC under Grant 12201321, Grant 12202622, and Grant 12201323; and in part by RGC Senior Research Fellow Scheme under Grant SRFS2324-2S02.
Publisher copyright:
© 2024 The Authors.
PY - 2024/5
Y1 - 2024/5
N2 - Lossless data hiding in ciphertexts (LDH-CT) is to perform data embedding without changing their plaintexts, which can be used to transmit extra data in the applications of homomorphic encryption at little cost. In this paper, two LDH-CT algorithms named Polynomial Encoding (PE) and Polynomial Modulation (PM) are proposed for the “N-th Degree Truncated Polynomial Ring Unit” (NTRU) scheme, respectively. In the PE algorithm, a polynomial is encoded according to a string of bit values and further used to encrypt a plain-text polynomial. After decrypting the ciphertext, the encoded polynomial can be retrieved so that dozens of bit values can be extracted from it. Moreover, the PE algorithm can be combined with a polynomial partitioning strategy to achieve data extraction before decryption as well. In applying the PM algorithm, no parameter setting of an NTRU cryptosystem is changed while a cipher-text polynomial is generated by selectively sampling a polynomial to match the to-be-hidden value. Furthermore, the data hidden with the PM algorithm can be pre-chosen to be extracted without decryption or after decryption, and in each case up to 10 bit values can be hidden into one cipher-text polynomial. The proposed algorithms and schemes are implemented and compared with several schemes developed for NTRU, BGN, LWE and Paillier encryption. Experimental results and performance evaluations demonstrate the efficacy and superiority of the proposed algorithms and schemes.
AB - Lossless data hiding in ciphertexts (LDH-CT) is to perform data embedding without changing their plaintexts, which can be used to transmit extra data in the applications of homomorphic encryption at little cost. In this paper, two LDH-CT algorithms named Polynomial Encoding (PE) and Polynomial Modulation (PM) are proposed for the “N-th Degree Truncated Polynomial Ring Unit” (NTRU) scheme, respectively. In the PE algorithm, a polynomial is encoded according to a string of bit values and further used to encrypt a plain-text polynomial. After decrypting the ciphertext, the encoded polynomial can be retrieved so that dozens of bit values can be extracted from it. Moreover, the PE algorithm can be combined with a polynomial partitioning strategy to achieve data extraction before decryption as well. In applying the PM algorithm, no parameter setting of an NTRU cryptosystem is changed while a cipher-text polynomial is generated by selectively sampling a polynomial to match the to-be-hidden value. Furthermore, the data hidden with the PM algorithm can be pre-chosen to be extracted without decryption or after decryption, and in each case up to 10 bit values can be hidden into one cipher-text polynomial. The proposed algorithms and schemes are implemented and compared with several schemes developed for NTRU, BGN, LWE and Paillier encryption. Experimental results and performance evaluations demonstrate the efficacy and superiority of the proposed algorithms and schemes.
KW - Homomorphic encryption
KW - lossless data hiding
KW - polynomial
KW - encoding
KW - modulation
UR - http://www.scopus.com/inward/record.url?scp=85184811330&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2024.3362592
DO - 10.1109/TIFS.2024.3362592
M3 - Journal article
SN - 1556-6013
VL - 19
SP - 3719
EP - 3732
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -