Score:6

Efficient multiplication modulo a square

ph flag

Can anyone point me to techniques for efficient computation of modular multiplication/exponentiation modulo a square, as comes up, e.g., in the context of Paillier encryption? The standard references don't seem to have anything relevant, probably because they tend to focus on RSA and/or elliptic-curve cryptography where this issue doesn't come up.

Update: my hope for an optimization here is based on the fact that computing $A \bmod N^2$ can seemingly be done more efficiently than a general reduction with a modulus of the same length by computing $(A \bmod N) + N* \left(\left(\frac{A - (A \bmod N)}{N}\right) \bmod N\right)$. So we replace one modular reduction with two reductions using moduli that are twice as small.

Score:4
my flag

Contrary to what fgrieu said, I believe we can do a bit better for the case of multiplication modulo $n^2$.

If we represent our values in the form $an+b$, $cn+d$ (where $0 \le a, b, c, d < n$), then we get the following multiplication algorithm:

$$f = bd \bmod n$$

$$e = (ad + bc + \lfloor bd / n \rfloor) \bmod n$$

with the result being $en+f$.

This uses 3 multiplications and 2 modulo $n$ computations (assuming the modulo and the division are available from the same computation).

With modulo $n' \approx n^2$, a similar technique gives three multiplications of values circa $\sqrt{n'}$ and a single modulo $n'$ operation - for the latter, I believe 2 modulo $n$ operations is cheaper.

user432944 avatar
ph flag
poncho, I believe you have a typo: the second step should be $e=(ad+bc+(bd-f)/n) \bmod n$. Thanks!
poncho avatar
my flag
@user432944: actually, with the $/$ operation, I meant the 'round down to the nearest integer' operation (python has // do mean that)
fgrieu avatar
ng flag
When using quadratic algorithms, counting bulk limb muladds only, for $k$-limb $n$ this technique does $5k^2$ muladds versus $8k^2$ for the standard technique, or $6k^2$ with Karatsuba at the higher level (and then the technique has less overhead than Karatsuba). There is no doubt this is worthwhile for practical parameters. I stand corrected!
Score:1
ng flag

I did not knew a technique that poncho proposes. It's considering integers modulo $n^2$ as integers of two superdigits in base $n$, saving much work (much like we can compute a product of two-decimal-digits integers modulo 100 with only three uses of a multiplication table).

With input and output in this two-superdigits form (as is the case inside modular exponentiation), the technique saves asymptotically $3/8$ (37%) of the work when using quadratic algorithms. A more relevant comparison is with Karatsuba multiplication at the top level, and then it saves $1/6$ (17%), with the additional benefit of lower overhead, since neither shifts nor signed intermediate value is involved. That's definitely worthwhile during modular exponentiation!

Other optimization techniques for multiplication (or exponentiation) modulo $n^2$ where $n$ is a large integer with no trivial factor (or $n$ prime), are those for multiplication (or exponentiation) modulo $n'$ with no trivial factor (or $n'$ prime), with $n'\approx n^2$. The later optimizations are well studied in RSA. However, the larger moduli in Paillier at equal security shift things towards making subquadratic algorithms like Karatsuba multiplication more attractive.

In Paillier encryption, the modulus $n^2$ has twice as many bits as $n$ in RSA, and the exponent is several hundred times as large as usual for the public-key side of things in RSA encryption. Thus Pailler encryption (and reencryption) can be thousands times slower than RSA encryption. But that's not as bad as it sounds because RSA encryption is typically hundreds time faster than RSA decryption.

For Pailler decryption, we can use the same time-saving technique as in RSA decryption: the Chinese Remainder Theorem. With $n$ the product of two primes $p$ and $q$, that will take the ciphertext modulo $p^2$ and deduce the plaintext modulo $p$, same for the plaintext modulo $q$, and then reconstruct the plaintext. That makes Pailler decryption very roughly 5 (typically at most 8) times slower than RSA decryption for the same $n$, at comparable optimization effort. The aforementioned "two-superdigits" technique also applies for decryption with CRT, on top of the numbers above.

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.