2018
DOI: 10.1155/2018/4957045
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

Abstract: In the emerging Internet of Things (IoT), lightweight public key cryptography plays an essential role in security and privacy protection. With the approach of quantum computing era, it is important to design and evaluate lightweight quantum-resistant cryptographic algorithms applicable to IoT. LWE-based cryptography is a widely used and well-studied family of postquantum cryptographic constructions whose hardness is based on worst-case lattice problems. To make LWE friendly to resource-constrained IoT devices,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Recently, further exotic variants have emerged in association with schemes submitted to the NIST postquantum cryptography standardization process. One can mention for example Compact-LWE [33,34], which has been broken [11,30,48]; learning with truncation, considered in pqNTRUSign [24]; and Mersenne variants of Ring-LWE, introduced for ThreeBears [22] and Mersenne-756839 [1].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, further exotic variants have emerged in association with schemes submitted to the NIST postquantum cryptography standardization process. One can mention for example Compact-LWE [33,34], which has been broken [11,30,48]; learning with truncation, considered in pqNTRUSign [24]; and Mersenne variants of Ring-LWE, introduced for ThreeBears [22] and Mersenne-756839 [1].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, TinyECC is a configurable and publicly-available ECC library suitable for supporting public-key cryptography in sensor networks and IoT devices [ 377 ]. With a view on the post-quantum era, where RSA and ECC algorithms can be vulnerable, lattice-based cryptography [ 378 ] is becoming increasingly important and its feasibility in lightweight IoT devices is promising [ 379 , 380 ].…”
Section: Information Security: Requirements Attacks and Solutionsmentioning
confidence: 99%
“…One might ask why a new lightweight authentication protocol since there is a bunch of proposals. The answer is simply because many of the aforementioned proposals have been broken [15][16][17][18][19][20] or have a storage and transmission cost unacceptably high [4,6] for highly constrained IoT devices. This new protocol is inspired by the MM proposal [21], i.e.…”
Section: Introductionmentioning
confidence: 99%