Abstract
In this chapter, we describe the analysis of security basis. One is the analysis of elliptic curve discrete logarithm problem (ECDLP). ECDLP is one of the public-key cryptosystems that can achieve a short key size but it is not a post-quantum cryptosystem. Another is analysis to learning with error (LWE), which is a post-quantum cryptosystem and has the functionality of homomorphic encryption. These two security bases have important roles in each protocol described in Sect. 2.2.4.2.
Original language | English |
---|---|
Title of host publication | Security Infrastructure Technology for Integrated Utilization of Big Data |
Subtitle of host publication | Applied to the Living Safety and Medical Fields |
Publisher | Springer Singapore |
Pages | 5-33 |
Number of pages | 29 |
ISBN (Electronic) | 9789811536540 |
ISBN (Print) | 9789811536533 |
DOIs | |
State | Published - 01 01 2020 |
Externally published | Yes |
Bibliographical note
Publisher Copyright:© The Author(s) 2020.