Cryptography core technology

Chen Mou Cheng, Kenta Kodera, Atsuko Miyaji*, Shinya Okumura

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this chapter, we describe the analysis of security basis. One is the analysis of elliptic curve discrete logarithm problem (ECDLP). ECDLP is one of the public-key cryptosystems that can achieve a short key size but it is not a post-quantum cryptosystem. Another is analysis to learning with error (LWE), which is a post-quantum cryptosystem and has the functionality of homomorphic encryption. These two security bases have important roles in each protocol described in Sect. 2.2.4.2.

Original languageEnglish
Title of host publicationSecurity Infrastructure Technology for Integrated Utilization of Big Data
Subtitle of host publicationApplied to the Living Safety and Medical Fields
PublisherSpringer Singapore
Pages5-33
Number of pages29
ISBN (Electronic)9789811536540
ISBN (Print)9789811536533
DOIs
StatePublished - 01 01 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© The Author(s) 2020.

Fingerprint

Dive into the research topics of 'Cryptography core technology'. Together they form a unique fingerprint.

Cite this