Lattice-based Cryptography

被引:0
|
作者
Mohsen, Ayman Wagih [1 ]
Bahaa-Eldin, Ayman M. [2 ]
Sobh, Mohamed Ali [1 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Cairo, Egypt
[2] Misr Int Univ, Cairo, Egypt
关键词
Post-quantum cryptography; learning with errors; public key cryptoystem; key exchange;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability. However, Quantum Computing threatens all the current PKCS as they offer a new model that can solve those hard problems, e.g. the factorization problem of RSA or the discrete logarithm problem of ELGAMAL algorithm. Lattice Based PKCS are a promising filed to introduce an immune cipher system against quantum cryptanalysis. This paper presents a summary of recent progress in the field of lattice-based cryptography, by focusing on the recent advancement in lattice-based public key cryptosystems and key exchange mechanisms based on the learning with errors (LWE) problem and its ring variant Ring-LWE.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [1] Lattice-based cryptography
    Regev, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [2] Lattice-Based Cryptography: A Survey
    Wang, Xiaoyun
    Xu, Guangwu
    Yu, Yang
    [J]. CHINESE ANNALS OF MATHEMATICS SERIES B, 2023, 44 (06) : 945 - 960
  • [3] Lattice-Based Cryptography:A Survey
    Xiaoyun WANG
    Guangwu XU
    Yang YU
    [J]. Chinese Annals of Mathematics,Series B, 2023, (06) : 945 - 960
  • [4] Lattice-Based Cryptography: A Survey
    Xiaoyun Wang
    Guangwu Xu
    Yang Yu
    [J]. Chinese Annals of Mathematics, Series B, 2023, 44 : 945 - 960
  • [5] Symbolic Proofs for Lattice-Based Cryptography
    Barthe, Gilles
    Fan, Xiong
    Gancher, Joshua
    Gregoire, Benjamin
    Jacomme, Charlie
    Shi, Elaine
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 538 - 555
  • [6] Proof of a Shuffle for Lattice-Based Cryptography
    Costa, Nuria
    Martinez, Ramiro
    Morillo, Paz
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 280 - 296
  • [7] Power Analysis Attacks for Lattice-Based Cryptography
    Li, Yan-Bin
    Zhu, Jia-Jie
    Tang, Ming
    Zhang, Huan-Guo
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 331 - 352
  • [8] Some Recent Progress in Lattice-Based Cryptography
    Peikert, Chris
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 72 - 72
  • [9] Preface to special topic on lattice-based cryptography
    Yu Yu
    [J]. National Science Review, 2021, 8 (09) : 6 - 6
  • [10] Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign
    Hoffstein, Jeff
    Howgrave-Graham, Nick
    Pipher, Jill
    Whyte, William
    [J]. LLL ALGORITHM: SURVEY AND APPLICATIONS, 2010, : 349 - 390