Paper 2014/078
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany and Rasool Jalili
Abstract
Most lattice-based cryptographic schemes which enjoy a security proof suffer from huge key sizes and heavy computations. This is also true for the simpler case of identification protocols. Recent progress on ideal lattices has significantly improved the efficiency, and made it possible to implement practical lattice-based cryptography on constrained devices like FPGAs and smart phones. However, to the best of our knowledge, no previous attempts were made to implement lattice-based schemes on smart cards. In this paper, we report the results of our implementation of several state-of-the-art and highly-secure lattice-based identification protocols on smart cards and microcontrollers. Our results show that only a few of such protocols fit into the limitations of these devices. We also discuss the implementation challenges and techniques to perform lattice-based cryptography on constrained devices, which may be of independent interest.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- Smart Card ImplementationLattice-based CryptographyPost-quantum CryptographyIdentification ProtocolConstrained Devices
- Contact author(s)
- boorghany @ gmail com
- History
- 2014-02-04: received
- Short URL
- https://ia.cr/2014/078
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/078, author = {Ahmad Boorghany and Rasool Jalili}, title = {Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/078}, year = {2014}, url = {https://eprint.iacr.org/2014/078} }