{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T01:34:50Z","timestamp":1775871290700,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Shota Rustaveli National Science Foundation of Georgia (SRNSF)","award":["STEM\u201322-1076"],"award-info":[{"award-number":["STEM\u201322-1076"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC with algorithms like Shor\u2019s algorithm, which can accelerate computations exponentially. This risks exposing these systems to attacks, necessitating quantum-resistant cryptography. Cloud computing poses data security concerns, requiring robust cryptographic mechanisms and access controls. Lattice-based cryptography, leveraging problems like the Short Integer Solution (SIS), emerges as a solution. This paper presents a novel quantum-resistant public key encryption scheme based on ElGamal and SIS, ensuring security against quantum and classical threats in modern cryptographic environments.<\/jats:p>","DOI":"10.3390\/cryptography8030031","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T12:21:03Z","timestamp":1720441263000},"page":"31","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal\u2019s Principles"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7535-2966","authenticated-orcid":false,"given":"Dana Sairangazhykyzy","family":"Amirkhanova","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, Information Processing and Storage, Satbayev University, Almaty 050013, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3109-7971","authenticated-orcid":false,"given":"Maksim","family":"Iavich","sequence":"additional","affiliation":[{"name":"School of Technology, Caucasus University, Tbilisi 0102, Georgia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8318-3794","authenticated-orcid":false,"given":"Orken","family":"Mamyrbayev","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Institute of Information and Computing Technologies, Almaty 050013, Kazakhstan"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ajtai, M. (1996;, January 22\u201324). Generating hard instances of lattice problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA. Preliminary version in STOC.","DOI":"10.1145\/237814.237838"},{"key":"ref_2","unstructured":"Regev, O. (2006, January 20\u201324). Lattice-based cryptography. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1145\/1039488.1039490","article-title":"New lattice-based cryptographic constructions","volume":"51","author":"Regev","year":"2004","journal-title":"J. ACM (JACM)"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Micciancio, D., and Goldwasser, S. (2002). Closest vector problem. Complexity of Lattice Problems: A Cryptographic Perspective, Springer.","DOI":"10.1007\/978-1-4615-0897-7"},{"key":"ref_5","unstructured":"Hanrot, G., Pujol, X., and Stehl\u00e9, D. (June, January 30). Algorithms for the shortest and closest lattice vector problems. Proceedings of the International Conference on Coding and Cryptology, Qingdao, China."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"7932","DOI":"10.1109\/TCOMM.2022.3215685","article-title":"Better lattice quantizers constructed from complex integers","volume":"70","author":"Lyu","year":"2022","journal-title":"IEEE Trans. Commun."},{"key":"ref_7","first-page":"1","article-title":"Lattice-based key exchange on small integer solution problem","volume":"57","author":"Wang","year":"2014","journal-title":"Sci. China Inf. Sci."},{"key":"ref_8","first-page":"6","article-title":"Lattice based merkle","volume":"2470","author":"Iavich","year":"2019","journal-title":"IVUS"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bandara, H., Herath, Y., Weerasundara, T., and Alawatugoda, J. (2022). On advances of lattice-based cryptographic schemes and their implementations. Cryptography, 6.","DOI":"10.3390\/cryptography6040056"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s00145-023-09488-w","article-title":"Lattice-Based Programmable Hash Functions and Applications","volume":"37","author":"Zhang","year":"2024","journal-title":"J. Cryptol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Tsiounis, Y., and Moti, Y. (1998, January 5\u20136). On the security of ElGamal based encryption. Proceedings of the International Workshop on Public Key Cryptography, Yokohama, Japan.","DOI":"10.1007\/BFb0054019"},{"key":"ref_12","unstructured":"Hecht, P. (2017). Post-Quantum Cryptography (PQC): Generalized ElGamal Cipher over GF (251^8). arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.20904\/284001","article-title":"Post-Quantum Cryptography: Generalized ElGamal cipher over GF (2518)","volume":"28","author":"Hecht","year":"2016","journal-title":"Theor. Appl. Inform."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1093\/comjnl\/bxad013","article-title":"Overfull: Too large aggregate signatures based on lattices","volume":"67","author":"Boudgoust","year":"2024","journal-title":"Comput. J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Brijwani, G.N., Ajmire, P.E., and Thawani, P.V. (2023). Future of quantum computing in cyber security. Handbook of Research on Quantum Computing for Smart Environments, IGI Global.","DOI":"10.4018\/978-1-6684-6697-1.ch016"},{"key":"ref_16","unstructured":"Lizama-P\u00e9rez, L.A. (2024). Introducing a Novel Quantum-Resistant Secret Key Establishment Method. arXiv."},{"key":"ref_17","first-page":"2725","article-title":"Enhanced Shor\u2019s algorithm with quantum circuit optimization","volume":"16","author":"Iqbal","year":"2024","journal-title":"Int. J. Inf. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7487","DOI":"10.30534\/ijatcse\/2020\/82952020","article-title":"An overview of quantum cryptography and shor\u2019s algorithm","volume":"9","author":"Ugwuishiwu","year":"2020","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bhatia, V., and Ramkumar, K.R. (2020, January 30\u201331). An efficient quantum computing technique for cracking RSA using Shor\u2019s algorithm. Proceedings of the 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/ICCCA49541.2020.9250806"},{"key":"ref_20","unstructured":"Chen, Y. (2024, July 05). Quantum Algorithms for Lattice Problems. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2024\/555."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Debris-Alazard, T., Fallahpour, P., and Stehl\u00e9, D. (2024, January 24\u201328). Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. Proceedings of the 56th Annual ACM Symposium on Theory of Computing, Vancouver, BC, Canada.","DOI":"10.1145\/3618260.3649766"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TCSI.2022.3219555","article-title":"KaLi: A crystal for post-quantum security using Kyber and Dilithium","volume":"70","author":"Aikata","year":"2022","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., and Karri, R. (2021). CRYSTALS-dilithium. Hardware Architectures for Post-Quantum Digital Signature Schemes, Springer.","DOI":"10.1007\/978-3-030-57682-0"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., and Aaraj, N. (2021). Falcon. Hardware Architectures for Post-Quantum Digital Signature Schemes, Springer.","DOI":"10.1007\/978-3-030-57682-0"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., and Aaraj, N. (2021). SPHINCS+. Hardware Architectures for Post-Quantum Digital Signature Schemes, Springer.","DOI":"10.1007\/978-3-030-57682-0"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Iavich, M., and Kuchukhidze, T. (2024). Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. Cryptography, 8.","DOI":"10.3390\/cryptography8020015"},{"key":"ref_27","unstructured":"Gr\u00fcnfeld, J. (2023). Mathias H. Side-Channel Attacks on CRYSTALS Kyber: An Analysis of a Post-Quantum Algorithm and Its Vulnerabilities to Sidechannel Attacks. [Master\u2019s Thesis, NTNU]."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/31\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:11:52Z","timestamp":1760109112000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/3\/31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":27,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["cryptography8030031"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8030031","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,8]]}}}