Lattice-based cryptography: the dots that provide information security
Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theore...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Proceedings |
Language: | English English |
Published: |
Pusat e-pembelajaran, UMS
2023
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/41293/ https://oer.ums.edu.my/handle/oer_source_files/2781 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sabah |
Language: | English English |
id |
my.ums.eprints.41293 |
---|---|
record_format |
eprints |
spelling |
my.ums.eprints.412932024-10-10T08:00:40Z https://eprints.ums.edu.my/id/eprint/41293/ Lattice-based cryptography: the dots that provide information security Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin Q1-295 General QA76.75-76.765 Computer software Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed. Pusat e-pembelajaran, UMS 2023 Proceedings PeerReviewed text en https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf Arif Mandangan and Hailiza Kamarulhaili and Muhammad Asyraf Asbullah and Che Haziqah Che Hussin (2023) Lattice-based cryptography: the dots that provide information security. https://oer.ums.edu.my/handle/oer_source_files/2781 |
institution |
Universiti Malaysia Sabah |
building |
UMS Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sabah |
content_source |
UMS Institutional Repository |
url_provider |
http://eprints.ums.edu.my/ |
language |
English English |
topic |
Q1-295 General QA76.75-76.765 Computer software |
spellingShingle |
Q1-295 General QA76.75-76.765 Computer software Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin Lattice-based cryptography: the dots that provide information security |
description |
Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed. |
format |
Proceedings |
author |
Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin |
author_facet |
Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin |
author_sort |
Arif Mandangan |
title |
Lattice-based cryptography: the dots that provide information security |
title_short |
Lattice-based cryptography: the dots that provide information security |
title_full |
Lattice-based cryptography: the dots that provide information security |
title_fullStr |
Lattice-based cryptography: the dots that provide information security |
title_full_unstemmed |
Lattice-based cryptography: the dots that provide information security |
title_sort |
lattice-based cryptography: the dots that provide information security |
publisher |
Pusat e-pembelajaran, UMS |
publishDate |
2023 |
url |
https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/41293/ https://oer.ums.edu.my/handle/oer_source_files/2781 |
_version_ |
1814049445952618496 |