Lattice-based cryptography: the dots that provide information security
Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theore...
Main Authors: | , , , |
---|---|
Format: | Proceedings |
Language: | English English |
Published: |
Pusat e-pembelajaran, UMS
2023
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf |
_version_ | 1825715842280587264 |
---|---|
author | Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin |
author_facet | Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin |
author_sort | Arif Mandangan |
collection | UMS |
description | Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed. |
first_indexed | 2024-12-09T00:52:08Z |
format | Proceedings |
id | ums.eprints-41293 |
institution | Universiti Malaysia Sabah |
language | English English |
last_indexed | 2024-12-09T00:52:08Z |
publishDate | 2023 |
publisher | Pusat e-pembelajaran, UMS |
record_format | dspace |
spelling | ums.eprints-412932024-10-10T08:00:40Z https://eprints.ums.edu.my/id/eprint/41293/ Lattice-based cryptography: the dots that provide information security Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin Q1-295 General QA76.75-76.765 Computer software Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. One of the alternatives is lattice-based cryptography. 2-dimensional lattices could be represented pictorially as group of dots in periodic order. By manipulating the mathematical concept behind the lattices, these dots are surprisingly able to provide information security through cryptography. In this paper, the mathematical foundation regarding lattices will be discussed while the formation of hard-mathematical problems based on lattices will be emphasized. Then, several established lattice-based cryptosystems will be introduced, including our newly improved lattice-based cryptosystem named as GGH-MKA cryptosystem. On top of that, some further development of the scheme will also be proposed. Pusat e-pembelajaran, UMS 2023 Proceedings PeerReviewed text en https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf Arif Mandangan and Hailiza Kamarulhaili and Muhammad Asyraf Asbullah and Che Haziqah Che Hussin (2023) Lattice-based cryptography: the dots that provide information security. https://oer.ums.edu.my/handle/oer_source_files/2781 |
spellingShingle | Q1-295 General QA76.75-76.765 Computer software Arif Mandangan Hailiza Kamarulhaili Muhammad Asyraf Asbullah Che Haziqah Che Hussin Lattice-based cryptography: the dots that provide information security |
title | Lattice-based cryptography: the dots that provide information security |
title_full | Lattice-based cryptography: the dots that provide information security |
title_fullStr | Lattice-based cryptography: the dots that provide information security |
title_full_unstemmed | Lattice-based cryptography: the dots that provide information security |
title_short | Lattice-based cryptography: the dots that provide information security |
title_sort | lattice based cryptography the dots that provide information security |
topic | Q1-295 General QA76.75-76.765 Computer software |
url | https://eprints.ums.edu.my/id/eprint/41293/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/41293/2/FULL%20TEXT.pdf |
work_keys_str_mv | AT arifmandangan latticebasedcryptographythedotsthatprovideinformationsecurity AT hailizakamarulhaili latticebasedcryptographythedotsthatprovideinformationsecurity AT muhammadasyrafasbullah latticebasedcryptographythedotsthatprovideinformationsecurity AT chehaziqahchehussin latticebasedcryptographythedotsthatprovideinformationsecurity |