{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:24:42Z","timestamp":1771518282844,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T00:00:00Z","timestamp":1672358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T00:00:00Z","timestamp":1672358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10586-022-03955-y","type":"journal-article","created":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T08:02:50Z","timestamp":1672387370000},"page":"285-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Quantum-resistant public-key encryption and signature schemes with smaller key sizes"],"prefix":"10.1007","volume":"27","author":[{"given":"Lacchita","family":"Soni","sequence":"first","affiliation":[]},{"given":"Harish","family":"Chandra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5401-7287","authenticated-orcid":false,"given":"Daya Sagar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Keval","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,30]]},"reference":[{"issue":"18","key":"3955_CR1","doi-asserted-by":"publisher","first-page":"e3363","DOI":"10.1002\/dac.3363","volume":"30","author":"DS Gupta","year":"2017","unstructured":"Gupta, D.S., Biswas, G.: An ECC-based authenticated group key exchange protocol in IBE framework. Int. J. Commun. Syst. 30(18), e3363 (2017)","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"3955_CR2","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11277-017-4399-5","volume":"96","author":"DS Gupta","year":"2017","unstructured":"Gupta, D.S., Biswas, G.: On securing bi-and tri-partite session key agreement protocol using IBE framework. Wirel. Pers. Commun. 96(3), 4505\u20134524 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"3955_CR3","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, pp. 365\u2013390 (2022)","DOI":"10.1145\/3549993.3550007"},{"issue":"2","key":"3955_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"3955_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3955_CR6","volume-title":"Lattice Attacks in Cryptography: A Partial Overview","author":"MJ Hinek","year":"2004","unstructured":"Hinek, M.J.: Lattice Attacks in Cryptography: A Partial Overview. School of Computer Science, University of Waterloo, Waterloo (2004)"},{"issue":"3","key":"3955_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4018\/JCIT.2015070103","volume":"17","author":"DS Gupta","year":"2015","unstructured":"Gupta, D.S., Biswas, G.: Secure computation on cloud storage: a homomorphic approach. J. Cases Inf. Technol. 17(3), 22\u201329 (2015)","journal-title":"J. Cases Inf. Technol."},{"issue":"6","key":"3955_CR8","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1137\/080733954","volume":"40","author":"C Peikert","year":"2011","unstructured":"Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. SIAM J. Comput. 40(6), 1803\u20131844 (2011)","journal-title":"SIAM J. Comput."},{"key":"3955_CR9","unstructured":"Peikert, C.: Bonsai trees (or, arboriculture in lattice-based cryptography). Cryptology ePrint Archive (2009)"},{"key":"3955_CR10","doi-asserted-by":"crossref","unstructured":"Bindel, N., Buchmann, J., Kr\u00e4mer, J.: Lattice-based signature schemes and their sensitivity to fault attacks. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 63\u201377. IEEE (2016)","DOI":"10.1109\/FDTC.2016.11"},{"issue":"12","key":"3955_CR11","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1007\/s00607-018-0689-3","volume":"101","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee, S., Gupta, D.S., Biswas, G.: An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. Computing 101(12), 1763\u20131788 (2019)","journal-title":"Computing"},{"key":"3955_CR12","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Halevi, S.: Collision-free hashing from lattice problems. In: Studies in Complexity and Cryptography. Miscellanea on the Interplay Between Randomness and Computation, pp. 30\u201339. Springer (2011)","DOI":"10.1007\/978-3-642-22670-0_5"},{"issue":"4","key":"3955_CR13","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s00037-007-0234-9","volume":"16","author":"D Micciancio","year":"2007","unstructured":"Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Comput. Complex. 16(4), 365\u2013411 (2007)","journal-title":"Comput. Complex."},{"issue":"3","key":"3955_CR14","doi-asserted-by":"publisher","first-page":"e3473","DOI":"10.1002\/dac.3473","volume":"31","author":"DS Gupta","year":"2018","unstructured":"Gupta, D.S., Biswas, G.: A novel and efficient lattice-based authenticated key exchange protocol in C-K model. Int. J. Commun. Syst. 31(3), e3473 (2018)","journal-title":"Int. J. Commun. Syst."},{"issue":"11","key":"3955_CR15","first-page":"1","volume":"57","author":"S Wang","year":"2014","unstructured":"Wang, S., Zhu, Y., Ma, D., Feng, R.: Lattice-based key exchange on small integer solution problem. Sci. China Inf. Sci. 57(11), 1\u201312 (2014)","journal-title":"Sci. China Inf. Sci."},{"key":"3955_CR16","doi-asserted-by":"crossref","unstructured":"Gupta, D.S.: A mutual authentication and key agreement protocol for smart grid environment using lattice. In: Proceedings of the International Conference on Computational Intelligence and Sustainable Technologies, pp. 239\u2013248. Springer (2022)","DOI":"10.1007\/978-981-16-6893-7_22"},{"key":"3955_CR17","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197\u2013206 (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"3955_CR18","doi-asserted-by":"crossref","unstructured":"Gupta, D.S., Karati, A., Saad, W., Da Costa, D.B.: Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Trans. Veh. Technol. 71(3), 3255\u20133266 (2022)","DOI":"10.1109\/TVT.2022.3144785"},{"issue":"1","key":"3955_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10586-021-03387-0","volume":"25","author":"S Darzi","year":"2022","unstructured":"Darzi, S., Akhbari, B., Khodaiemehr, H.: LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust. Comput. 25(1), 263\u2013278 (2022)","journal-title":"Clust. Comput."},{"key":"3955_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comcom.2021.09.031","volume":"181","author":"DS Gupta","year":"2022","unstructured":"Gupta, D.S., Ray, S., Singh, T., Kumari, M.: Post-quantum lightweight identity-based two-party authenticated key exchange protocol for internet of vehicles with probable security. Comput. Commun. 181, 69\u201379 (2022)","journal-title":"Comput. Commun."},{"issue":"2","key":"3955_CR21","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"3955_CR22","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 99\u2013108 (1996)","DOI":"10.1145\/237814.237838"},{"key":"3955_CR23","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case\/average-case equivalence. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 284\u2013293 (1997)","DOI":"10.1145\/258533.258604"},{"key":"3955_CR24","unstructured":"Ajtai, M., Dwork, C.: The first and fourth public-key cryptosystems with worst-case\/average-case equivalence. In: Electronic Colloquium on Computational Complexity (ECCC), vol.\u00a014. CiteSeer (2007)"},{"key":"3955_CR25","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Practical lattice-based cryptography: a signature scheme for embedded systems. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 530\u2013547. Springer (2012)","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"3955_CR26","doi-asserted-by":"crossref","unstructured":"Bai, S., Galbraith, S.D.: An improved compression technique for signatures based on learning with errors. In: Cryptographers\u2019 Track at the RSA Conference, pp. 28\u201347. Springer (2014)","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"3955_CR27","doi-asserted-by":"crossref","unstructured":"Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal gaussians. In: Annual Cryptology Conference, pp. 40\u201356. Springer (2013)","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"3955_CR28","first-page":"755","volume":"2015","author":"E Alkim","year":"2015","unstructured":"Alkim, E., Bindel, N., Buchmann, J., Dagdelen, \u00d6., Schwabe, P.: TESLA: tightly-secure efficient signatures from standard lattices. IACR Cryptol. ePrint Arch. 2015, 755 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"3955_CR29","doi-asserted-by":"crossref","unstructured":"Akleylek, S., Bindel, N., Buchmann, J., Kr\u00e4mer, J., Marson, G.A.: An efficient lattice-based signature scheme with provably secure instantiation. In: International Conference on Cryptology in Africa, pp. 44\u201360. Springer (2016)","DOI":"10.1007\/978-3-319-31517-1_3"},{"key":"3955_CR30","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key $$\\{$$Exchange\u2014A$$\\}$$ new hope. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 327\u2013343 (2016)"},{"issue":"6","key":"3955_CR31","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1145\/1039488.1039490","volume":"51","author":"O Regev","year":"2004","unstructured":"Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899\u2013942 (2004)","journal-title":"J. ACM"},{"key":"3955_CR32","doi-asserted-by":"crossref","unstructured":"Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 333\u2013342 (2009)","DOI":"10.1145\/1536414.1536461"},{"key":"3955_CR33","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H) IBE in the standard model. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 553\u2013572. Springer (2010)","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"3955_CR34","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more. In: International Workshop on Public Key Cryptography, pp. 499\u2013517. Springer (2010)","DOI":"10.1007\/978-3-642-13013-7_29"},{"key":"3955_CR35","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 700\u2013718. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_41"},{"issue":"2","key":"3955_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-0721-4","volume":"60","author":"S Mao","year":"2017","unstructured":"Mao, S., Zhang, P., Wang, H., Zhang, H., Wu, W.: Cryptanalysis of a lattice based key exchange protocol. Sci. China Inf. Sci. 60(2), 1\u20133 (2017)","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"3955_CR37","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s10586-018-2293-x","volume":"22","author":"Z Jing","year":"2019","unstructured":"Jing, Z., Gu, C., Yu, Z., Shi, P., Gao, C.: Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Clust. Comput. 22(1), 1717\u20131727 (2019)","journal-title":"Clust. Comput."},{"issue":"6","key":"3955_CR38","doi-asserted-by":"publisher","first-page":"e3255","DOI":"10.1002\/ett.3255","volume":"29","author":"DS Gupta","year":"2018","unstructured":"Gupta, D.S., Biswas, G.: Design of lattice-based ElGamal encryption and signature schemes using SIS problem. Trans. Emerg. Telecommun. Technol. 29(6), e3255 (2018)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"3","key":"3955_CR39","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1007\/s10586-021-03380-7","volume":"25","author":"K Seyhan","year":"2022","unstructured":"Seyhan, K., Nguyen, T.N., Akleylek, S., Cengiz, K.: Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust. Comput. 25(3), 1729\u20131748 (2022)","journal-title":"Clust. Comput."},{"key":"3955_CR40","doi-asserted-by":"crossref","unstructured":"Tang, Y., Ba, Y., Li, L., Wang, X., Yan, X.: Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIot. Clust. Comput. 25, 2305\u20132316 (2022)","DOI":"10.1007\/s10586-021-03488-w"},{"issue":"3","key":"3955_CR41","doi-asserted-by":"publisher","first-page":"3620","DOI":"10.1109\/JSYST.2020.3016065","volume":"15","author":"DS Gupta","year":"2020","unstructured":"Gupta, D.S., Islam, S.H., Obaidat, M.S., Karati, A., Sadoun, B.: LAAC: lightweight lattice-based authentication and access control protocol for E-health systems in IoT environments. IEEE Syst. J. 15(3), 3620\u20133627 (2020)","journal-title":"IEEE Syst. J."},{"key":"3955_CR42","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference, pp. 37\u201354. Springer (2008)","DOI":"10.1007\/978-3-540-78524-8_3"},{"issue":"3","key":"3955_CR43","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/IJISP.2017070105","volume":"11","author":"DS Gupta","year":"2017","unstructured":"Gupta, D.S., Biswas, G.: A secure cloud storage using ECC-based homomorphic encryption. Int. J. Inf. Secur. Priv. 11(3), 54\u201362 (2017)","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"6","key":"3955_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1\u201340 (2009)","journal-title":"J. ACM"},{"issue":"4","key":"3955_CR45","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s00145-011-9105-2","volume":"25","author":"D Cash","year":"2012","unstructured":"Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. J. Cryptol. 25(4), 601\u2013639 (2012)","journal-title":"J. Cryptol."},{"issue":"1","key":"3955_CR46","first-page":"41","volume":"5","author":"Y Xu","year":"2014","unstructured":"Xu, Y., Tian, M., Huang, L., Yang, W., Shen, X.: Improvement of a lattice-based signature scheme. J. Inf. Hiding Multimed. Signal Process. 5(1), 41\u201346 (2014)","journal-title":"J. Inf. Hiding Multimed. Signal Process."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03955-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03955-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03955-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T16:11:11Z","timestamp":1708791071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03955-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,30]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["3955"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03955-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,30]]},"assertion":[{"value":"1 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"None.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}