{"id":"https://openalex.org/W2899134616","doi":"https://doi.org/10.1109/jiot.2018.2878707","title":"Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions","display_name":"Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions","publication_year":2018,"publication_date":"2018-10-30","ids":{"openalex":"https://openalex.org/W2899134616","doi":"https://doi.org/10.1109/jiot.2018.2878707","mag":"2899134616"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2018.2878707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2878707","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://durham-repository.worktribe.com/output/1249315","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086598229","display_name":"Rajat Chaudhary","orcid":"https://orcid.org/0000-0002-6554-918X"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajat Chaudhary","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036704324","display_name":"Gagangeet Singh Aujla","orcid":"https://orcid.org/0000-0002-2870-8938"},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gagangeet Singh Aujla","raw_affiliation_strings":["Computer Science and Engineering Department, Chandigarh University, Mohali, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Chandigarh University, Mohali, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002810652","display_name":"Sherali Zeadally","orcid":"https://orcid.org/0000-0002-5982-8190"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherali Zeadally","raw_affiliation_strings":["College of Communication and Information, University of Kentucky, Lexington, KY, USA"],"affiliations":[{"raw_affiliation_string":"College of Communication and Information, University of Kentucky, Lexington, KY, USA","institution_ids":["https://openalex.org/I143302722"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086598229"],"corresponding_institution_ids":["https://openalex.org/I162030827"],"apc_list":null,"apc_paid":null,"fwci":7.1565,"has_fulltext":false,"cited_by_count":94,"citation_normalized_percentile":{"value":0.97586327,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"6","issue":"3","first_page":"4897","last_page":"4909"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8129177689552307},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6062211990356445},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5881198048591614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5605254173278809},{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.5594111084938049},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5478451251983643},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5243851542472839},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5072948336601257},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4419041872024536},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.4409826397895813},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4201701879501343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3811347484588623},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34563201665878296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8129177689552307},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6062211990356445},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5881198048591614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5605254173278809},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.5594111084938049},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5478451251983643},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5243851542472839},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5072948336601257},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4419041872024536},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.4409826397895813},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4201701879501343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3811347484588623},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34563201665878296}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2018.2878707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2878707","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:durham-repository.worktribe.com:1249315","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1249315","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:durham-repository.worktribe.com:1249315","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1249315","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W31130112","https://openalex.org/W57720693","https://openalex.org/W87154849","https://openalex.org/W149470655","https://openalex.org/W151792660","https://openalex.org/W1493856790","https://openalex.org/W1595771334","https://openalex.org/W1598269861","https://openalex.org/W1675339804","https://openalex.org/W1893972099","https://openalex.org/W2041602336","https://openalex.org/W2050689197","https://openalex.org/W2058785578","https://openalex.org/W2071825329","https://openalex.org/W2102542363","https://openalex.org/W2122973102","https://openalex.org/W2140256428","https://openalex.org/W2154611405","https://openalex.org/W2282554529","https://openalex.org/W2395416745","https://openalex.org/W2398538644","https://openalex.org/W2595933558","https://openalex.org/W2606882085","https://openalex.org/W2619405973","https://openalex.org/W2626160579","https://openalex.org/W2753380128","https://openalex.org/W2786976866","https://openalex.org/W2796495462","https://openalex.org/W2810641345","https://openalex.org/W2885665137","https://openalex.org/W2888299293","https://openalex.org/W2951509472","https://openalex.org/W2963117533","https://openalex.org/W2993783864","https://openalex.org/W4206104390","https://openalex.org/W4298022300","https://openalex.org/W6602383322","https://openalex.org/W6605963903","https://openalex.org/W6711890953","https://openalex.org/W6712624421","https://openalex.org/W6764696691"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W119571841","https://openalex.org/W2942137924","https://openalex.org/W1936753088","https://openalex.org/W4236344152","https://openalex.org/W1980043050","https://openalex.org/W4310649982","https://openalex.org/W4387895128","https://openalex.org/W4280589839","https://openalex.org/W2153886246"],"abstract_inverted_index":{"Due":[0],"to":[1,151,182],"its":[2],"widespread":[3],"popularity":[4],"and":[5,17,73,75,92,117,144,175,186,207,216,232],"usage":[6,43],"in":[7,41,53,190,219,238],"many":[8],"applications":[9],"(smart":[10],"transport,":[11],"energy":[12],"management,":[13],"e-healthcare,":[14],"smart":[15],"ecosystem,":[16],"so":[18],"on),":[19],"the":[20,32,42,54,60,67,101,104,134,141,145,152,197,214,228,239],"Internet":[21],"of":[22,44,56,88,113,136,154,221],"Things":[23],"(IoT)":[24],"has":[25],"become":[26],"popular":[27],"among":[28],"end":[29],"users":[30,72],"over":[31],"last":[33],"few":[34],"years.":[35],"However,":[36],"with":[37,149,172],"an":[38,51],"exponential":[39],"increase":[40,52],"IoT":[45,61,82,102,159,240],"technologies,":[46],"we":[47,162,226],"have":[48],"been":[49],"witnessing":[50],"number":[55],"cyber":[57],"attacks":[58,99],"on":[59,100],"environment.":[62,241],"An":[63],"adversary":[64],"can":[65,76],"capture":[66],"private":[68],"key":[69,107,210],"shared":[70],"between":[71],"devices":[74],"launch":[77],"various":[78,165],"attacks,":[79],"such":[80,168],"as":[81,169],"ransomware,":[83],"Mirai":[84],"botnet,":[85],"man-in-the-middle,":[86],"denial":[87],"service,":[89],"chosen":[90,93],"plaintext,":[91],"ciphertext.":[94],"To":[95],"mitigate":[96],"these":[97,222],"security":[98],"environment,":[103],"traditional":[105],"public":[106],"cryptographic":[108,156],"primitives":[109,157],"are":[110,179],"inadequate":[111],"because":[112],"their":[114],"high":[115],"computational":[116],"communication":[118],"costs.":[119],"Therefore,":[120],"lattice-based":[121,155],"public-key":[122],"cryptosystem":[123],"(LB-PKC)":[124],"is":[125],"a":[126,191],"promising":[127],"technique":[128],"for":[129,158,235],"secure":[130,208],"communication.":[131],"We":[132,194,212],"discuss":[133,164,227],"taxonomy":[135],"two":[137],"major":[138],"problems,":[139],"namely,":[140],"shortest":[142,184],"path":[143,147,185],"closest":[146],"problems":[148,189],"respect":[150],"applicability":[153],"devices.":[160],"Moreover,":[161],"also":[163],"LB-PKC":[166,237],"techniques,":[167],"NTRU,":[170],"learning":[171],"errors":[173],"(LWEs),":[174],"ring-LWE":[176],"(R-LWE)":[177],"which":[178],"often":[180],"used":[181],"solve":[183],"lattice":[187],"NP-hard":[188],"polynomial":[192],"time.":[193],"further":[195],"classify":[196],"R-LWE":[198],"into":[199],"three":[200],"categories,":[201],"namely":[202],"identity-based":[203],"encryption,":[204,206],"homomorphic":[205],"authentication":[209],"exchange.":[211],"describe":[213],"operations":[215],"algorithms":[217],"adopted":[218],"each":[220],"encryption":[223],"mechanisms.":[224],"Finally,":[225],"challenges,":[229],"open":[230],"issues,":[231],"future":[233],"directions":[234],"applying":[236]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":22},{"year":2019,"cited_by_count":5}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
