Paper 2014/078

Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers

Ahmad Boorghany and Rasool Jalili

Abstract

Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However, to the best of our knowledge, no previous attempts were made to implement lattice-based schemes on smart cards. In this paper, we report the results of our implementation of several state-of-the-art and highly-secure lattice-based identification protocols on smart cards and microcontrollers. Our results show that only a few of such protocols fit into the limitations of these devices. We also discuss the implementation challenges and techniques to perform lattice-based cryptography on constrained devices, which may be of independent interest.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Smart Card ImplementationLattice-based CryptographyPost-quantum CryptographyIdentification ProtocolConstrained Devices
Contact author(s)
boorghany @ gmail com
History
2014-02-04: received
Short URL
https://ia.cr/2014/078
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/078,
      author = {Ahmad Boorghany and Rasool Jalili},
      title = {Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/078},
      year = {2014},
      url = {https://eprint.iacr.org/2014/078}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.