Comparison of Lattice-Based Key Exchange Protocols for Quantum Computing Attack 


Vol. 42,  No. 11, pp. 2200-2207, Nov.  2017
10.7840/kics.2017.42.11.2200


PDF
  Abstract

Lattice-based cryptography is one of attractive candidates for Post Quantum Cryptography(PQC), which remains secure from quantum adversaries. Lattice-based cryptography is currently applied to many cryptographic schemes like functional encryption, homomorphic encryption, homomorphic signature, and obfuscation. Likewise, lattice-based key exchange protocols replace DH-like key exchange protocols in a quantum world. In this paper, we study 7 known lattice-based (authenticated) key exchange protocols and compare those protocols over hard problem, sampling algorithm, security analysis, and efficiency followed by further work.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

R. Choi, H. An, J. Lee, S. Kim, K. Kim, "Comparison of Lattice-Based Key Exchange Protocols for Quantum Computing Attack," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 11, pp. 2200-2207, 2017. DOI: 10.7840/kics.2017.42.11.2200.

[ACM Style]

Rakyong Choi, Hyeongcheol An, Jeeun Lee, Sungsook Kim, and Kwangjo Kim. 2017. Comparison of Lattice-Based Key Exchange Protocols for Quantum Computing Attack. The Journal of Korean Institute of Communications and Information Sciences, 42, 11, (2017), 2200-2207. DOI: 10.7840/kics.2017.42.11.2200.

[KICS Style]

Rakyong Choi, Hyeongcheol An, Jeeun Lee, Sungsook Kim, Kwangjo Kim, "Comparison of Lattice-Based Key Exchange Protocols for Quantum Computing Attack," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 11, pp. 2200-2207, 11. 2017. (https://doi.org/10.7840/kics.2017.42.11.2200)