Lattice-based cryptography: the dots that provide information security

Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theore...

Full description

Bibliographic Details
Main Authors: Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin
Format: Proceedings
Language:English
English
Published: Pusat e-pembelajaran, UMS 2023
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf
_version_ 1825715842280587264
author Arif Mandangan
Hailiza Kamarulhaili
Muhammad Asyraf Asbullah
Che Haziqah Che Hussin
author_facet Arif Mandangan
Hailiza Kamarulhaili
Muhammad Asyraf Asbullah
Che Haziqah Che Hussin
author_sort Arif Mandangan
collection UMS
description Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed.
first_indexed 2024-12-09T00:52:08Z
format Proceedings
id ums.eprints-41293
institution Universiti Malaysia Sabah
language English
English
last_indexed 2024-12-09T00:52:08Z
publishDate 2023
publisher Pusat e-pembelajaran, UMS
record_format dspace
spelling ums.eprints-412932024-10-10T08:00:40Z https://eprints.ums.edu.my/id/eprint/41293/ Lattice-based cryptography: the dots that provide information security Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin Q1-295 General QA76.75-76.765 Computer software Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed. Pusat e-pembelajaran, UMS 2023 Proceedings PeerReviewed text en https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf Arif Mandangan and Hailiza Kamarulhaili and Muhammad Asyraf Asbullah and Che Haziqah Che Hussin (2023) Lattice-based cryptography: the dots that provide information security. https://oer.ums.edu.my/handle/oer_source_files/2781
spellingShingle Q1-295 General
QA76.75-76.765 Computer software
Arif Mandangan
Hailiza Kamarulhaili
Muhammad Asyraf Asbullah
Che Haziqah Che Hussin
Lattice-based cryptography: the dots that provide information security
title Lattice-based cryptography: the dots that provide information security
title_full Lattice-based cryptography: the dots that provide information security
title_fullStr Lattice-based cryptography: the dots that provide information security
title_full_unstemmed Lattice-based cryptography: the dots that provide information security
title_short Lattice-based cryptography: the dots that provide information security
title_sort lattice based cryptography the dots that provide information security
topic Q1-295 General
QA76.75-76.765 Computer software
url https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf
work_keys_str_mv AT arifmandangan latticebasedcryptographythedotsthatprovideinformationsecurity
AT hailizakamarulhaili latticebasedcryptographythedotsthatprovideinformationsecurity
AT muhammadasyrafasbullah latticebasedcryptographythedotsthatprovideinformationsecurity
AT chehaziqahchehussin latticebasedcryptographythedotsthatprovideinformationsecurity