Post-Quantum Lattice-Based Cryptography Implementations

Author:

Nejatollahi Hamid1,Dutt Nikil1,Ray Sandip2,Regazzoni Francesco3,Banerjee Indranil4,Cammarota Rosario4

Affiliation:

1. University of California Irvine, Irvine, California

2. University of Florida

3. ALaRi

4. Qualcomm Technologies Inc., San Diego, CA

Abstract

The advent of quantum computing threatens to break many classical cryptographic schemes, leading to innovations in public key cryptography that focus on post-quantum cryptography primitives and protocols resistant to quantum computing threats. Lattice-based cryptography is a promising post-quantum cryptography family, both in terms of foundational properties as well as in its application to both traditional and emerging security problems such as encryption, digital signature, key exchange, and homomorphic encryption. While such techniques provide guarantees, in theory, their realization on contemporary computing platforms requires careful design choices and tradeoffs to manage both the diversity of computing platforms (e.g., high-performance to resource constrained), as well as the agility for deployment in the face of emerging and changing standards. In this work, we survey trends in lattice-based cryptographic schemes, some recent fundamental proposals for the use of lattices in computer security, challenges for their implementation in software and hardware, and emerging needs for their adoption. The survey means to be informative about the math to allow the reader to focus on the mechanics of the computation ultimately needed for mapping schemes on existing hardware or synthesizing part or all of a scheme on special-purpose har dware.

Funder

Qualcomm Technology Inc.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference185 articles.

1. Hamid Nejatollahi Nikil Dutt Sandip Ray Francesco Regazzoni Indranil Banerjee and Rosario Cammarota. 2017. Software and hardware implementation of lattice-cased cryptography schemes. University of California Irvine CECS TR 17-04 (2017). Hamid Nejatollahi Nikil Dutt Sandip Ray Francesco Regazzoni Indranil Banerjee and Rosario Cammarota. 2017. Software and hardware implementation of lattice-cased cryptography schemes. University of California Irvine CECS TR 17-04 (2017).

2. Peter W. Shor. 1997. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal of Computing (1997). 10.1137/S0097539795293172 Peter W. Shor. 1997. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal of Computing (1997). 10.1137/S0097539795293172

3. Gui-Lu Long. 2001. Grover algorithm with zero theoretical failure rate. Physical Review A (2001). Gui-Lu Long. 2001. Grover algorithm with zero theoretical failure rate. Physical Review A (2001).

4. Ali Ansarmohammadi Saeed Shahinfar and Hamid Nejatollahi. 2015. Fast and area efficient implementation for chaotic image encryption algorithms. In CADS. Ali Ansarmohammadi Saeed Shahinfar and Hamid Nejatollahi. 2015. Fast and area efficient implementation for chaotic image encryption algorithms. In CADS.

5. Ali Ansarmohammadi Hamid Nejatollahi and Ghasemi Mehdi. 2013. A low-cost implementation of AES accelerator using HW/SW co-design technique. In CADS. Ali Ansarmohammadi Hamid Nejatollahi and Ghasemi Mehdi. 2013. A low-cost implementation of AES accelerator using HW/SW co-design technique. In CADS.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3