Research

Lattice Based Cryptography : Its Applications, Areas of Interest & Future Scope

Publisher: IEEE

Authors: Pawan Kumar Pradhan
Co-Authors: Sayan Rakshit, Sujoy Datta

Abstract: With a recent increase in the advancement of the technology, computer system and it’s sensitive data are getting exhibited to unauthorised users, with steadily corroding the fundamentals of computer security. This, in fact, demanded fundamental innovations that require several cryptographic paradigms and security protocol. Previously it was thought that asymmetric cryptographic key like RSA, Diffie-Hellman, are very hard to decrypt by classical computation, but with the implementation of quantum computation, it is proved that this kind of cryptographic algorithm is very easy to decrypt and hackers can steal important Data [3], [6]. After the release of Ajtai’s research paper " Generating Hard Instances of Lattice Problem" [2], a million reasons arose in the minds of the researchers to develop on methods based on lattice-based cryptography to improve their security needs. Firstly, it provided much stronger security, and the average-case of several problems in lattice-based cryptography seems equivalent to the worst-case problem of these problems [2]. Moreover, lattices have the potential to persuade the cryptanalytic attacks created by any quantum computers i.e Quantum Computational Secure [3]. In this paper, we will discuss lattice-based cryptosystem, it’s security dimensions, a general brief on how it works, future scope, applications and areas of Interest.

Published in: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)

Date of Conference: 27-29 March 2019                     DOI: 10.1109/ICCMC.2019.8819706

                             

Date Added to IEEE Xplore: 29 August 2019            Conference Location: Erode, India

ISBN Information:      

Electronic ISBN:978-1-5386-7808-4

DVD ISBN:978-1-5386-7807-7

Print on Demand(PoD) ISBN:978-1-5386-7809-1

Read Here: 

Link
Link
Link
Lattice_Based_Cryptography__Its_Applications_Areas_of_Interest_amp_Future_Scope.pdf