Cryptology ePrint Archive: Report 2014/078
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany and Rasool Jalili
Abstract: Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However, to the best of our knowledge, no previous attempts were made to implement lattice-based schemes on smart cards. In this paper, we report the results of our implementation of several state-of-the-art and highly-secure lattice-based identification protocols on smart cards and microcontrollers. Our results show that only a few of such protocols fit into the limitations of these devices. We also discuss the implementation challenges and techniques to perform lattice-based cryptography on constrained devices, which may be of independent interest.
Category / Keywords: implementation / Smart Card Implementation, Lattice-based Cryptography, Post-quantum Cryptography, Identification Protocol, Constrained Devices
Date: received 4 Feb 2014
Contact author: boorghany at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20140204:170339 (All versions of this report)
Short URL: ia.cr/2014/078
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]