Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms

被引:0
|
作者
Akleylek, Sedat [1 ]
Satilmis, Hami [1 ]
机构
[1] Ondokuz Mayis Univ, Bilgisayar Muhendisligi Bolumu, Samsun, Turkey
关键词
sieving algorithms; lattice-based cryptography; SVP; parameter selection;
D O I
10.1109/ubmk.2019.8907018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of quantum resistant lattice-based cryptosystems mainly depend on the shortest vector problem (SVP) or the closest vector problem (CVP). In this paper, sieving algorithms such as ListSieve, GaussSieve, ProGaussSieve and HashSieve are discussed and compared in terms of their complexity and capabilities. The algorithm of Becker et al., used in LIVE-Estimator software, is analyzed by considering HashSieve to generate reliable parameter sets. According to the experimental results, up to 81-bit security level, using HashSieve is comparable with other algorithms. It's shown that for low security levels small key sizes can be obtained.
引用
收藏
页码:372 / 377
页数:6
相关论文
共 50 条
  • [41] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [42] Lattice-based sums
    El-Zekey, Moataz
    Medina, Jesus
    Mesiar, Radko
    INFORMATION SCIENCES, 2013, 223 : 270 - 284
  • [43] Lattice-based signcryption
    Li, Fagen
    Bin Muhaya, Fahad T.
    Khan, Muhammad Khurram
    Takagi, Tsuyoshi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (14): : 2112 - 2122
  • [44] Lattice codes for lattice-based PKE
    Lyu, Shanxiang
    Liu, Ling
    Ling, Cong
    Lai, Junzuo
    Chen, Hao
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 917 - 939
  • [45] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kübra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    Cluster Computing, 2022, 25 (03): : 1729 - 1748
  • [46] Improving lattice based cryptosystems using the hermite normal form
    Micciancio, D
    CRYPTOGRAPHY AND LATTICES, 2001, 2146 : 126 - 145
  • [47] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Kübra Seyhan
    Tu N. Nguyen
    Sedat Akleylek
    Korhan Cengiz
    Cluster Computing, 2022, 25 : 1729 - 1748
  • [48] Portable Implementation of Lattice-Based Cryptography Using JavaScript
    20161902341243
    (1) Graduate School of Mathematics, Kyushu University, Japan; (2) Institute of Mathematics for Industry, Kyushu University, Japan; (3) Department of Electrical Engineering, National Taiwan University, Taiwan; (4) KDDI Laboratories, Taiwan; (5) CREST, Japan Science and Technology Agency, Japan, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [49] Lattice-based biclustering using Partition Pattern Structures
    Codocedo, Victor
    Napoli, Amedeo
    21ST EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2014), 2014, 263 : 213 - 218
  • [50] Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
    Seyhan, Kubra
    Nguyen, Tu N.
    Akleylek, Sedat
    Cengiz, Korhan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (03): : 1729 - 1748