RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices

Cited 20 time in webofscience Cited 17 time in scopus
  • Hit : 337
  • Download : 195
DC FieldValueLanguage
dc.contributor.authorLee, Jooheeko
dc.contributor.authorKim, Duhyeongko
dc.contributor.authorLee, Hyungkyuko
dc.contributor.authorLee, Younhoko
dc.contributor.authorCheon, Jung Heeko
dc.date.accessioned2019-02-20T04:51:53Z-
dc.date.available2019-02-20T04:51:53Z-
dc.date.created2019-01-28-
dc.date.created2019-01-28-
dc.date.issued2019-
dc.identifier.citationIEEE ACCESS, v.7, pp.2080 - 2091-
dc.identifier.issn2169-3536-
dc.identifier.urihttp://hdl.handle.net/10203/250214-
dc.description.abstractWe propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems. Because RLizard operates on a special type of ring, it is more efficient in terms of both the clock cycles required for key generation and the key size compared with the original Lizard scheme. To demonstrate the superiority of the proposed method over other well-known KEMs, we compared their performances in the 32-bit ARM Internet of Things (IoT) environment. The performance analysis showed that the RLizard KEM requires the fewest clock cycles for key generation, encapsulation, and decapsulation when the parameters are set to support a security level comparable with that of AES-128. In summary, the RLizard KEM is expected to be used for secure communication and authentication between IoT endpoint devices, whose computational power is generally limited.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleRLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices-
dc.typeArticle-
dc.identifier.wosid000455696300001-
dc.identifier.scopusid2-s2.0-85057855170-
dc.type.rimsART-
dc.citation.volume7-
dc.citation.beginningpage2080-
dc.citation.endingpage2091-
dc.citation.publicationnameIEEE ACCESS-
dc.identifier.doi10.1109/ACCESS.2018.2884084-
dc.contributor.nonIdAuthorLee, Joohee-
dc.contributor.nonIdAuthorKim, Duhyeong-
dc.contributor.nonIdAuthorLee, Younho-
dc.contributor.nonIdAuthorCheon, Jung Hee-
dc.description.isOpenAccessY-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorKey encapsulation mechanism-
dc.subject.keywordAuthorpost-quantum cryptography-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordPlusLATTICE-BASED CRYPTOGRAPHY-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusTHINGS-
Appears in Collection
Files in This Item
000455696300001.pdf(2.76 MB)Download
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 20 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0