Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (Q2055683)

From MaRDI portal
Revision as of 23:48, 19 March 2024 by Openalex240319060354 (talk | contribs) (Set OpenAlex properties.)
scientific article
Language Label Description Also known as
English
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
scientific article

    Statements

    Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    1 December 2021
    0 references
    Lattice-based cryptosystems are seen as an alternative in post-quantum computing. They do share a disadvantage with multivariate cryptography, namely key and ciphertexts sizes, or lengths in bits. In this paper, the authors introduce an asymetric encryption method based on the problem learning with errors (LWE). This problem was introduced by \textit{O. Regev} [J. ACM 56, No. 6, Article No. 34, 40 p. (2009; Zbl 1325.68101)] and consists in recovering \(\mathfrak{s}\in\mathbb{Z}\) from a linear system \(\mathfrak{b}=A\mathfrak{s}+\mathfrak{e}\) when \((A,\mathfrak{b})\) are known as well as the probability distribution of \(\mathfrak{e}\) and it is related to find short integer solutions (SIS) in lattices over modular rings. Those problems are still hard for quantum computing, thus lattice-based cryptography is considered at present time as an alternative for post-quantum cryptography. The proposed schemes achieve great reductions in the lenghts of keys, ciphertexts and signatures through special modular maps and useful selection of parameters. The authors prove that the cipher schemes are secure against chosen cipertext-attacks and the signing protocols are secure against chosen message-attacks. Besides, several useful criteria are discussed in order to select several parameters to improve efficiency and robustness of the proposed methods. For the entire collection see [Zbl 1481.94004].
    0 references
    lattice-based cryptography
    0 references
    learning with errors problem
    0 references
    short integer solution problem
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references