Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era
-
Published:2023-06-12
Issue:12
Volume:12
Page:2643
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Sabani Maria E.1ORCID, Savvas Ilias K.1ORCID, Poulakis Dimitrios2ORCID, Garani Georgia1ORCID, Makris Georgios C.1ORCID
Affiliation:
1. Department of Digital Systems, University of Thessaly, Geopolis Campus, Larissa-Trikala Ring-Road, 415 00 Larissa, Greece 2. Department of Mathematics, Aristotle University of Thessaloniki, 541 24 Thessaloniki, Greece
Abstract
The rapid development of quantum computing devices promises powerful machines with the potential to confront a variety of problems that conventional computers cannot. Therefore, quantum computers generate new threats at unprecedented speed and scale and specifically pose an enormous threat to encryption. Lattice-based cryptography is regarded as the rival to a quantum computer attack and the future of post-quantum cryptography. So, cryptographic protocols based on lattices have a variety of benefits, such as security, efficiency, lower energy consumption, and speed. In this work, we study the most well-known lattice-based cryptosystems while a systematic evaluation and comparison is also presented.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference80 articles.
1. Sabani, M., Savvas, I.K., Poulakis, D., and Makris, G. (2022, January 25–27). Quantum Key Distribution: Basic Protocols and Threats. Proceedings of the 26th Pan-Hellenic Conference on Informatics (PCI 2022), Athens, Greece. 2. Nielsen, M., and Chuang, I. (2011). Quantum Computation and Quantum Information, Cambridge University Press. 3. Sabani, M., Savvas, I.K., Poulakis, D., Makris, G., and Butakova, M. (2023, January 20–23). The BB84 Quantum Key Protocol and Potential Risks. Proceedings of the 8th International Congress on Information and Communication Technology (ICICT 2023), London, UK. 4. Preskill, J. (2011, January 19–25). Quantum computing and the entanglement frontier. Proceedings of the 25th Solvay Conference on Physics, Brussels, Belgium. Available online: https://arxiv.org/abs/1203.5813. 5. Poulakis, D. (2004). Cryptography, the Science of Secure Communication, Ziti Publications. [1st ed.].
|
|