{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:12Z","timestamp":1761621372502,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFA0303903","2013CB834205","61502269"],"award-info":[{"award-number":["2017YFA0303903","2013CB834205","61502269"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"973 National Program on Key Basic Research Project of China","award":["2017YFA0303903","2013CB834205","61502269"],"award-info":[{"award-number":["2017YFA0303903","2013CB834205","61502269"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFA0303903","2013CB834205","61502269"],"award-info":[{"award-number":["2017YFA0303903","2013CB834205","61502269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>In the emerging Internet of Things (IoT), lightweight public key cryptography plays an essential role in security and privacy protection. With the approach of quantum computing era, it is important to design and evaluate lightweight quantum-resistant cryptographic algorithms applicable to IoT. LWE-based cryptography is a widely used and well-studied family of postquantum cryptographic constructions whose hardness is based on worst-case lattice problems. To make LWE friendly to resource-constrained IoT devices, a variant of LWE, named Compact-LWE, was proposed and used to design lightweight cryptographic schemes. In this paper, we study the so-called Compact-LWE problem and clarify that under certain parameter settings it can be solved in polynomial time. As a consequence, our result leads to a practical attack against an instantiated scheme based on Compact-LWE proposed by Liu et al. in 2017.<\/jats:p>","DOI":"10.1155\/2018\/4957045","type":"journal-article","created":{"date-parts":[[2018,3,11]],"date-time":"2018-03-11T23:31:49Z","timestamp":1520811109000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7149-885X","authenticated-orcid":true,"given":"Dianyan","family":"Xiao","sequence":"first","affiliation":[{"name":"Institute for Advanced Study, Tsinghua University, Beijing 100084, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0120-0648","authenticated-orcid":true,"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China"}]}],"member":"311","reference":[{"issue":"4","key":"20","first-page":"60","volume":"8","year":"2017","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"4","key":"33","first-page":"45","volume":"7","year":"2017","journal-title":"Journal of Internet Services and Information Security"},{"issue":"2","key":"30","first-page":"44","volume":"8","year":"2017","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"},{"issue":"2","key":"10","first-page":"60","volume":"7","year":"2016","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"3","key":"3","first-page":"40","volume":"6","year":"2016","journal-title":"Journal of Internet Services and Information Security"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1706"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2577022"},{"issue":"3","key":"31","first-page":"1","volume":"7","year":"2017","journal-title":"Journal of Internet Services and Information Security"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"volume-title":"CRYSTALS \u2013 Dilithium: Digital signatures from module lattices","year":"2017","key":"11"},{"volume-title":"CRYSTALS \u2013 Kyber: a cca-secure module-lattice-based kem","year":"2017","key":"7"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_33"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2750146"},{"volume-title":"Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication","year":"2017","key":"23"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_21"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_31"},{"volume-title":"Cryptanalysis of Compact-LWE","year":"2017","key":"6"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"year":"2010","key":"29"},{"key":"4","series-title":"Lecture Notes in Comput. Sci.","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0023990","volume-title":"On Lov\u00e1sz\u2019 lattice reduction and the nearest lattice point problem","volume":"182","year":"1985"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4957045.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4957045.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4957045.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T03:59:28Z","timestamp":1589860768000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/4957045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":21,"alternative-id":["4957045","4957045"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4957045","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}