• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang. Recent Advances in Lattice-Based Cryptography[J]. Journal of Computer Research and Development, 2017, 54(10): 2121-2129. DOI: 10.7544/issn1000-1239.2017.20170628
Citation: Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang. Recent Advances in Lattice-Based Cryptography[J]. Journal of Computer Research and Development, 2017, 54(10): 2121-2129. DOI: 10.7544/issn1000-1239.2017.20170628

Recent Advances in Lattice-Based Cryptography

More Information
  • Published Date: September 30, 2017
  • Lattice theory was first introduced to cryptography as a cryptanalysis tool to analyze knapsack and RSA cryptosystem. In 1997, Ajtai and Dwork constructed the first lattice cryptography: Ajtai-Dwork; and then in 1998, NTRU is appeared. Since factorization and discrete logarithm based cryptography was the mainstream, lattice-based cryptography has not received enough attention. Until 2009, Gentry constructed the first fully homomorphic encryption, which led to a wide of development of lattice cryptography. In 2015, Peikert made a summary of the development of lattice cryptography in “A decade of lattice cryptography”. Also in 2015, NIST released “Report on post-quantum cryptography”. According to the report, due to the rapid development of quantum computation technology, the existing standard of public key cryptography in quantum computing will be no longer safe. At the same time, NIST has launched a worldwide collection of quantum cryptography algorithms. As a classic quantum-resistant cryptography, lattice-based cryptography is known as the most promising competitor. Therefore, lattice cryptography has attracted much attention in recent years, and a lot of excellent results have been appeared. In this paper, we summarize the main results of lattice cryptography for the past two years, which consist of zero-knowledge proofs, encryption, signature and key exchange; and at last, we outlook the development trend of lattice-based cryptography.
  • Related Articles

    [1]LiFeng, PanJingkui. Human Motion Recognition Based on Triaxial Accelerometer[J]. Journal of Computer Research and Development, 2016, 53(3): 621-631. DOI: 10.7544/issn1000-1239.2016.20148159
    [2]Lü Zhiguo, Li Yan, Xu Xin. Research on Fast 3D Hand Motion Tracking System[J]. Journal of Computer Research and Development, 2012, 49(7): 1398-1407.
    [3]Liu Weibin, Liu Xingqi, Xing Weiwei, Yuan Baozong. Improving Motion Synthesis by Semantic Control[J]. Journal of Computer Research and Development, 2011, 48(7): 1255-1262.
    [4]Lu Jiyuan, Zhang Peizhao, Duan Xiaohua, Chao Hongyang. An Optimized Motion Estimation Algorithm Based on Macroblock Priorities[J]. Journal of Computer Research and Development, 2011, 48(3): 494-500.
    [5]Xia Shihong, Wei Yi, and Wang Zhaoqi. A Survey of Physics-Based Human Motion Simulation[J]. Journal of Computer Research and Development, 2010, 47(8): 1354-1361.
    [6]Zong Dan, Li Chunpeng, Xia Shihong, Wang Zhaoqi. Key-Postures Based Automated Construction of Motion Graph[J]. Journal of Computer Research and Development, 2010, 47(8): 1321-1328.
    [7]Zhang Zhixian, Liu Jianhua, and Ning Ruxin. Research on Motion Simulation Realization Technology of Planar Linkage Based on Virtual Environment[J]. Journal of Computer Research and Development, 2010, 47(6): 979-987.
    [8]Mao Tianlu, Xia Shihong, Zhu Xiaolong, and Wang Zhaoqi. Real-Time Garment Animation Based on Mixed Model[J]. Journal of Computer Research and Development, 2010, 47(1): 8-15.
    [9]Yang Yuedong, Wang Lili, and Hao Aimin. Motion String: A Motion Capture Data Representation for Behavior Segmentation[J]. Journal of Computer Research and Development, 2008, 45(3): 527-534.
    [10]Zhao Guoying, Li Zhenbo, Deng Yu, Li Hua. Human Motion Recognition and Simulation Based on Retrieval[J]. Journal of Computer Research and Development, 2006, 43(2): 368-373.

Catalog

    Article views (2973) PDF downloads (2617) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return