Paper 2014/078

Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers

Ahmad Boorghany and Rasool Jalili


Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However, to the best of our knowledge, no previous attempts were made to implement lattice-based schemes on smart cards. In this paper, we report the results of our implementation of several state-of-the-art and highly-secure lattice-based identification protocols on smart cards and microcontrollers. Our results show that only a few of such protocols fit into the limitations of these devices. We also discuss the implementation challenges and techniques to perform lattice-based cryptography on constrained devices, which may be of independent interest.

Available format(s)
Publication info
Preprint. MINOR revision.
Smart Card ImplementationLattice-based CryptographyPost-quantum CryptographyIdentification ProtocolConstrained Devices
Contact author(s)
boorghany @ gmail com
2014-02-04: received
Short URL
Creative Commons Attribution


      author = {Ahmad Boorghany and Rasool Jalili},
      title = {Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers},
      howpublished = {Cryptology ePrint Archive, Paper 2014/078},
      year = {2014},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.