Filters








5,035 Hits in 4.2 sec

Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things [article]

Rui Xu, Chi Cheng, Yue Qin, Tao Jiang
2018 arXiv   pre-print
In this paper, we summarize the advantages of lattice-based cryptography and the state of art of their implementations for IoT devices.  ...  As a promising candidate for the future post-quantum cryptography standard, lattice-based cryptography enjoys the advantages of strong security guarantees and high efficiency, which make it extremely suitable  ...  ACKNOWLEDGMENTS The work presented in this paper was supported in part by the National Natural Science Foundation of China under Grant no. 61672029.  ... 
arXiv:1805.04880v1 fatcat:327pcoavungejelvhpvd3ofwky

lattice based cryptography.pdf

ganesh E N
2022 figshare.com  
In this paper, we summarize the advantages of lattice-based cryptography and the state of art of their implementations for IoT devices  ...  As a promising candidate for the future post-quantum cryptography standard, lattice-based cryptography enjoys the advantages of strong security guarantees and high efficiency, which make it extremely suitable  ...  From the practical aspect, this worst-case reduction makes parameter selection and key generation much easier in lattice-based cryptography.  ... 
doi:10.6084/m9.figshare.19802590.v1 fatcat:5ksga2srmrh33fcnizsicdrvte

Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure

Suhri Kim, Seokhie Hong
2018 Applied Sciences  
The Gaussian sampler is an integral part in lattice-based cryptography as it has a direct connection to security and efficiency.  ...  In this paper, we propose the first single trace power analysis attack on a constant-time cumulative distribution table (CDT) sampler used in lattice-based cryptosystems.  ...  Five categories are mainly considered in post-quantum cryptography: multivariate-based cryptography, code-based cryptography, lattice-based cryptography, hash-based digital signature, and isogeny-based  ... 
doi:10.3390/app8101809 fatcat:og2xttoihbgdnhgykcz7o5vz7m

Lattice-Based PKE/KEM

Xianhui Lu, Jiang Zhang
2021 National Science Review  
Lattice-based cryptography is one of the most promising families among the five post-quantum cryptography categories.  ...  It may be selected as the next generation cryptographic standard by international organizations for standardization. We will describe the recent progress of lattice-based post-quantum cryptography.  ...  After more than two decades of development, lattice-based cryptography has gained substantial progress.  ... 
doi:10.1093/nsr/nwab090 pmid:34691742 pmcid:PMC8433073 fatcat:rmdoxluh2nbrjefl5x6a42yzde

NFLlib: NTT-Based Fast Lattice Library [chapter]

Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint
2016 Lecture Notes in Computer Science  
Acknowledgements This work has been supported in part by the European Union's H2020 Programme under grant agreement number ICT-644209 and by French's FUI project CRYPTOCOMP.  ...  The reason for this is that, in lattice based cryptography, we often want to offload work from the NTT to the inverse NTT.  ...  We refer to [25, 2, 3] for selecting concrete security parameters of lattice encryption schemes. (see Sec. 4).  ... 
doi:10.1007/978-3-319-29485-8_20 fatcat:el47i4l2vvbg7dheptw7dnl7yu

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

Zulianie Binti Jemihin, Soo Fun Tan, Gwo-Chin Chung
2022 Cryptography  
This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes.  ...  Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).  ...  on lattice-based cryptography.  ... 
doi:10.3390/cryptography6030040 fatcat:h3zmbvouwvchvnb54as7zsa3li

Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances

Zhe Liu, Patrick Longa, Cetin Kaya Koc
2018 IEEE transactions on computers  
In the call for papers of this special issue we encouraged submissions about any of the competing families of PQC algorithms, such as code-based, hash-based, isogeny-based, lattice-based and multivariate  ...  The authors look in particular at fault attacks against implementations of lattice-based signatures and key exchange protocols.  ...  In the call for papers of this special issue we encouraged submissions about any of the competing families of PQC algorithms, such as code-based, hash-based, isogeny-based, lattice-based and multivariate  ... 
doi:10.1109/tc.2018.2869611 fatcat:aw4i4jifm5ftrgmwn5bgonucje

Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices

Utsav Banerjee, Anantha P. Chandrakasan
2020 ICC 2020 - 2020 IEEE International Conference on Communications (ICC)  
Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based public key cryptography to reduce communication overheads in wireless sensor networks.  ...  We also propose concrete parameters for the underlying lattice computations and provide detailed implementation results.  ...  Selection of Efficient and Secure Parameters Unlike classical public key cryptography, Ring-LWE parameter selection is a complex task because of the multitude of parameters involved and their varying effects  ... 
doi:10.1109/icc40277.2020.9148829 dblp:conf/icc/BanerjeeC20 fatcat:k4e5h4tfqrf4be3t3l2njgi2pe

An Improved Post-Quantum Cryptographic Scheme Based on NTRU

Sachin Kumar, Saibal K. Pal
2013 International Journal of Computer Applications Technology and Research  
NTRU is lattice based scheme resistant to quantum computing, hence it falls under the class of post quantum cryptosystems.  ...  In this paper we report a more secure and efficient encryption algorithm based on the NTRU cryptographic scheme.  ...  Security is based on the hard problem and the selection of the parameter set. in this scheme we have integer parameter N , P , Q and four set choosing the number of one and two in the polynomial like df  ... 
doi:10.7753/ijcatr0204.1020 fatcat:uhrrwewbzndobjb5x6tu4nx3ji

A Fuzzy Identity-Based Signcryption Scheme from Lattices

2014 KSII Transactions on Internet and Information Systems  
In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography.  ...  Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme  ...  Definition 2.2 Two integer lattices, as well as a lattice shift, are often used in lattice-based cryptography, and we give their definitions as follows. For 1.  ... 
doi:10.3837/tiis.2014.11.031 fatcat:4rcaovkip5ha7auvyl3542b3b4

Post-Quantum Cryptography: State of the Art [chapter]

Johannes A. Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt
2016 Lecture Notes in Computer Science  
Public-key cryptography is indispensable for cyber security.  ...  Lattice-based public-key cryptography Lattice-based cryptography is similar to code-based cryptography.  ...  In turn, the hardness of these problems is based on the hardness of lattice problems. Lattice-based public-key cryptography is very promising.  ... 
doi:10.1007/978-3-662-49301-4_6 fatcat:ylrv42q33fegnidacywmkzmvme

Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms

Rameez Asif
2021 IoT  
regular lattice-based implantation and its simplification in lightweight lattice-based cryptography (LW-LBC).  ...  Lattices have been widely used in cryptography, somewhat peculiarly, and these algorithms have been used in both; (a) cryptoanalysis by using lattice approximation to break cryptosystems; and (b) cryptography  ...  Alan Woodward from University of Surrey, UK for the valuable discussions and lectures on post-quantum cryptography. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/iot2010005 fatcat:ja6nldq4mjafhb2bcyzhxa7efu

Design of a Robust Normal Distribution Sampler for Ring-Learning-With-Errors Cryptographic Scheme

Sangook Moon
2015 International Journal of Security and Its Applications  
In this contribution, a novel viewpoint on designing a Normal distribution sampler applicable for implementing a homomorphic encryption system based on Ring-LWE crypto scheme is proposed.  ...  This characteristic of zero-knowledge property explains the versatility in lattice based cryptography [5] [6] .  ...  Recently, the most well-known lattice based cryptography known as secure is the learning with errors (LWE) problem [13] .  ... 
doi:10.14257/ijsia.2015.9.9.05 fatcat:eomfox6rm5fbdcf3h2gmtenkee

The Geometry of Lattice Cryptography [chapter]

Daniele Micciancio
2011 Lecture Notes in Computer Science  
Lattice cryptography is one of the hottest and fastest moving areas in mathematical cryptography today. Interest in lattice cryptography is due to several concurring factors.  ...  In these notes, we give an introduction to the mathematical theory of lattices, describe the main tools and techniques used in lattice cryptography, and present an overview of the wide range of cryptographic  ...  Random Lattices and Lattice Cryptography Lattice cryptography is based on the conjectured hardness of SIVP, i.e., the problem of computing (a set of n linearly independent) short vectors in a lattice.  ... 
doi:10.1007/978-3-642-23082-0_7 fatcat:fwjkhdpxpvckzewi6bc3kpa3qi

Adaptive Pixel-Selection Fractional Chaotic Map Lattices for image cryptography
English

Sittigorn Jirasak, Paithoonwattanakij Kitti
2015 Scientific Research and Essays  
A non-integer order has an effect on the range of chaos's parameter. Moreover, the encryption sequence has been adaptively selected based on another chaos generator.  ...  Image cryptography with Chaotic Map Lattices (CML) uses the chaos parameters, the number of iterations and the number of cycles for encryption as secret keys.  ...  In order to enhance the encryption security, an Adaptive Pixel-Selection Fractional Chaotic Map Lattices (APFCML) algorithm is proposed, where the encryption sequence has been adaptively selected.  ... 
doi:10.5897/sre2015.6248 fatcat:duznoxsmubh6xgf2wntpxudk7u
« Previous Showing results 1 — 15 out of 5,035 results