Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era

被引:3
|
作者
Sabani, Maria E. [1 ]
Savvas, Ilias K. [1 ]
Poulakis, Dimitrios [2 ]
Garani, Georgia [1 ]
Makris, Georgios C. [1 ]
机构
[1] Univ Thessaly, Dept Digital Syst, Geopolis Campus,Larissa Trikala Ring Rd, Larisa 41500, Greece
[2] Aristotle Univ Thessaloniki, Dept Math, Thessaloniki 54124, Greece
关键词
quantum computing; lattice-based cryptosystems; post-quantum cryptography; CRYPTANALYSIS; ERRORS; GGH;
D O I
10.3390/electronics12122643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of quantum computing devices promises powerful machines with the potential to confront a variety of problems that conventional computers cannot. Therefore, quantum computers generate new threats at unprecedented speed and scale and specifically pose an enormous threat to encryption. Lattice-based cryptography is regarded as the rival to a quantum computer attack and the future of post-quantum cryptography. So, cryptographic protocols based on lattices have a variety of benefits, such as security, efficiency, lower energy consumption, and speed. In this work, we study the most well-known lattice-based cryptosystems while a systematic evaluation and comparison is also presented.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
    Zheng, Mengce
    Kang, Hao
    CYBERSECURITY, 2024, 7 (01):
  • [22] Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask
    Wang, Yuntao
    Ikematsu, Yasuhiko
    Yasuda, Takanori
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 88 - 104
  • [23] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kübra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    Cluster Computing, 2022, 25 (03): : 1729 - 1748
  • [24] Exploring the fusion of lattice-based quantum key distribution for secure Internet of Things communications
    Biswas, Sujit
    Goswami, Rajat S.
    Hemant Kumar Reddy, K.
    Mohanty, Sachi Nandan
    Ahmed, Mohammed Altaf
    IET QUANTUM COMMUNICATION, 2024, 5 (04): : 322 - 339
  • [25] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Kübra Seyhan
    Tu N. Nguyen
    Sedat Akleylek
    Korhan Cengiz
    Cluster Computing, 2022, 25 : 1729 - 1748
  • [26] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kubra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1729 - 1748
  • [27] Lattice-Based Secure Biometric Authentication for Hamming Distance
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Joohee
    Shin, Junbum
    Song, Yongsoo
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 653 - 672
  • [28] Unified-pipelined NTT Architecture for Polynomial Multiplication in Lattice-based Cryptosystems
    Trong-Hung Nguyen
    Nguyen The Binh
    Huynh Phuc Nghi
    Cong-Kha Pham
    Trong-Thuc Hoang
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [29] A secure lattice-based anonymous authentication scheme for VANETs
    Liu, Hui
    Sun, Yining
    Xu, Yan
    Xu, Rui
    Wei, Zhuo
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 66 - 73
  • [30] A strongly secure lattice-based key exchange protocol
    Wen, Weiqiang
    Wang, Libin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2258 - 2269