Lattice-based Cryptography

被引:0
|
作者
Mohsen, Ayman Wagih [1 ]
Bahaa-Eldin, Ayman M. [2 ]
Sobh, Mohamed Ali [1 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Cairo, Egypt
[2] Misr Int Univ, Cairo, Egypt
关键词
Post-quantum cryptography; learning with errors; public key cryptoystem; key exchange;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Among the different cryptosystems, the Public Key Cryptosystems (PKCS) are of great usage and are used in many applications. Most of the current PKCS are based on a hard problem making the cryptanalysis of such cipher infeasible given the current computing and memory availability. However, Quantum Computing threatens all the current PKCS as they offer a new model that can solve those hard problems, e.g. the factorization problem of RSA or the discrete logarithm problem of ELGAMAL algorithm. Lattice Based PKCS are a promising filed to introduce an immune cipher system against quantum cryptanalysis. This paper presents a summary of recent progress in the field of lattice-based cryptography, by focusing on the recent advancement in lattice-based public key cryptosystems and key exchange mechanisms based on the learning with errors (LWE) problem and its ring variant Ring-LWE.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [31] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Martinoli, Marco
    Regazzoni, Francesco
    Oswald, Elisabeth
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [32] Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
    Gueneysu, Tim
    Lyubashevsky, Vadim
    Poeppelmann, Thomas
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 530 - 547
  • [33] Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    Lee, Cheng-Chi
    [J]. MATHEMATICS, 2021, 9 (14)
  • [34] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Nejatollahi, Hamid
    Shahhosseini, Sina
    Cammarota, Rosario
    Dutt, Nikil
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (10): : 1139 - 1148
  • [35] Portable Implementation of Lattice-based Cryptography using Java']JavaScript
    Yuan, Ye
    Cheng, Chen-Mou
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Takagi, Tsuyoshi
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 58 - 67
  • [36] Attacking and defending masked polynomial comparison for lattice-based cryptography
    Bhasin, Shivam
    D’anvers, Jan-Pieter
    Heinz, Daniel
    Pöppelmann, Thomas
    Van Beirendonck, Michiel
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 334 - 359
  • [37] Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography
    格密码关键运算模块的硬件实现优化与评估
    [J]. Ma, Yuan (mayuan@iie.ac.cn), 2021, Peking University (57): : 595 - 604
  • [38] Towards Efficient Discrete Gaussian Sampling for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    [J]. 2015 25TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2015,
  • [39] Performance Analysis of Number Theoretic Transform for Lattice-Based Cryptography
    Mohsen, Ayman W.
    Sobh, Mohamed A.
    Bahaa-Eldin, Ayman M.
    [J]. PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2018, : 442 - 447
  • [40] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Hamid Nejatollahi
    Sina Shahhosseini
    Rosario Cammarota
    Nikil Dutt
    [J]. Journal of Signal Processing Systems, 2021, 93 : 1139 - 1148