Ring-LWE: applications to cryptography and their efficient realization

Sujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
230 Downloads (Pure)

Abstract

The persistent progress of quantum computing with algorithms of Shor and Proos and Zalka has put our present RSA and ECC based public key cryptosystems at peril. There is a flurry of activity in cryptographic research community to replace classical cryptography schemes with their post-quantum counterparts. The learning with errors problem introduced by Oded Regev offers a way to design secure cryptography schemes in the post-quantum world. Later for efficiency LWE was adapted for ring polynomials known as Ring-LWE. In this paper we discuss some of these ring-LWE based schemes that have been designed. We have also drawn comparisons of different implementations of those schemes to illustrate their evolution from theoretical proposals to practically feasible schemes.
Original languageEnglish
Title of host publicationSecurity, Privacy, and Applied Cryptography Engineering
Subtitle of host publication6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
EditorsClaude Carlet, M. Anwar Hasan, Vishal Saraswat
PublisherSpringer
Chapter18
Pages323-331
Number of pages9
ISBN (Electronic)978-3-319-49445-6
ISBN (Print)978-3-319-49444-9
DOIs
Publication statusPublished - 18 Nov 2016
Event6th International Conference on Security, Privacy, and Applied Cryptography Engineering, (SPACE 2016) - Hyderabad, India
Duration: 14 Dec 201618 Dec 2016

Publication series

Name Lecture Notes in Computer Science
PublisherSpringer
Volume10076
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Security, Privacy, and Applied Cryptography Engineering, (SPACE 2016)
Country/TerritoryIndia
City Hyderabad
Period14/12/1618/12/16

Keywords

  • Post-quantum cryptography
  • Learning with errors
  • Ring learning with errors
  • Implementations

Fingerprint

Dive into the research topics of 'Ring-LWE: applications to cryptography and their efficient realization'. Together they form a unique fingerprint.

Cite this