Cryptology ePrint Archive: Report 2014/078

Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers

Ahmad Boorghany and Rasool Jalili

Abstract: Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However, to the best of our knowledge, no previous attempts were made to implement lattice-based schemes on smart cards. In this paper, we report the results of our implementation of several state-of-the-art and highly-secure lattice-based identification protocols on smart cards and microcontrollers. Our results show that only a few of such protocols fit into the limitations of these devices. We also discuss the implementation challenges and techniques to perform lattice-based cryptography on constrained devices, which may be of independent interest.

Category / Keywords: implementation / Smart Card Implementation, Lattice-based Cryptography, Post-quantum Cryptography, Identification Protocol, Constrained Devices

Date: received 4 Feb 2014

Contact author: boorghany at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20140204:170339 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]