{"id":"https://openalex.org/W3038282584","doi":"https://doi.org/10.1109/vtc2020-spring48590.2020.9129505","title":"Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study","display_name":"Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3038282584","doi":"https://doi.org/10.1109/vtc2020-spring48590.2020.9129505","mag":"3038282584"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2020-spring48590.2020.9129505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2020-spring48590.2020.9129505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062935399","display_name":"Abdolmaged Alkhulaifi","orcid":"https://orcid.org/0000-0003-2886-1470"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdolmaged Alkhulaifi","raw_affiliation_strings":["Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062935399"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":1.3713,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85272664,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.704800009727478},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.49274423718452454},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4749736189842224},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.4361831843852997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3926253914833069},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3297952711582184},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2930524945259094},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.29175156354904175},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2429068386554718},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.22022467851638794},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.1193971037864685},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09150537848472595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.704800009727478},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.49274423718452454},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4749736189842224},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.4361831843852997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3926253914833069},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3297952711582184},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2930524945259094},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.29175156354904175},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2429068386554718},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.22022467851638794},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.1193971037864685},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09150537848472595},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2020-spring48590.2020.9129505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2020-spring48590.2020.9129505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W49132692","https://openalex.org/W147447691","https://openalex.org/W149470655","https://openalex.org/W151792660","https://openalex.org/W1599862784","https://openalex.org/W1675339804","https://openalex.org/W1942594900","https://openalex.org/W2007466965","https://openalex.org/W2058785578","https://openalex.org/W2084652510","https://openalex.org/W2089477764","https://openalex.org/W2098290658","https://openalex.org/W2125093890","https://openalex.org/W2135205181","https://openalex.org/W2288803494","https://openalex.org/W2552662125","https://openalex.org/W2611046206","https://openalex.org/W2767399671","https://openalex.org/W2785593630","https://openalex.org/W2791664942","https://openalex.org/W2794556148","https://openalex.org/W2795270809","https://openalex.org/W2895182117","https://openalex.org/W2919820018","https://openalex.org/W2963939356","https://openalex.org/W2969837009","https://openalex.org/W3002720885","https://openalex.org/W3023478445","https://openalex.org/W3111297213","https://openalex.org/W4285719527","https://openalex.org/W6605963903","https://openalex.org/W6668387570","https://openalex.org/W6729722249","https://openalex.org/W6760420702","https://openalex.org/W6772466715"],"related_works":["https://openalex.org/W2093721992","https://openalex.org/W2225844805","https://openalex.org/W3216234213","https://openalex.org/W1958530007","https://openalex.org/W2158180875","https://openalex.org/W3147655995","https://openalex.org/W2411991704","https://openalex.org/W3022971036","https://openalex.org/W4242073250","https://openalex.org/W2771724667"],"abstract_inverted_index":{"Due":[0],"to":[1,21,55,94],"the":[2,5,77,150,161],"scalability":[3],"of":[4,79,87,139],"stateless":[6],"and":[7,25,96,106,108,143],"compact":[8],"JSON":[9],"Web":[10],"Tokens":[11],"(JWT),":[12],"they":[13],"are":[14,42,69,84],"increasingly":[15],"used":[16],"in":[17,28,92,137],"securing":[18],"modern":[19],"applications":[20],"support":[22],"single-sign-on":[23],"context":[24],"establish":[26],"trust":[27],"microservices":[29],"or":[30,47],"connected-devices":[31],"architectures.":[32],"However,":[33],"currently":[34],"JWT":[35,53,98],"relies":[36],"on":[37,44],"traditional":[38],"encryption":[39],"algorithms":[40],"that":[41,127],"based":[43],"integer":[45],"factorization":[46],"discrete":[48],"logarithm":[49],"problems;":[50],"this":[51,73],"exposes":[52],"signatures":[54],"vulnerability":[56],"when":[57,159],"quantum":[58,70],"computers":[59],"become":[60],"available.":[61],"Recently,":[62],"NIST":[63,85],"has":[64,148],"announced":[65],"new":[66],"standards":[67],"which":[68,83],"safe.":[71],"In":[72],"paper,":[74],"we":[75,101],"investigate":[76],"usage":[78],"two":[80],"quantum-resistant":[81],"algorithms,":[82],"candidates":[86],"round":[88],"2":[89],"standardization":[90],"process":[91],"2019,":[93],"create":[95],"verify":[97],"signatures.":[99],"Namely,":[100],"consider":[102],"lattice-based":[103,128],"schemes":[104,131],"(DILITHIUM":[105],"qTESLA)":[107],"compare":[109],"their":[110],"performance":[111,134,152,157],"against":[112],"RSA":[113,136],"for":[114,117],"digital":[115,129],"signature":[116,130],"different":[118],"security":[119,162],"levels":[120],"defined":[121],"by":[122],"NIST.":[123],"The":[124],"results":[125],"show":[126],"have":[132],"better":[133],"than":[135],"terms":[138],"request":[140],"per":[141],"seconds":[142],"average":[144],"response":[145],"time.":[146],"DILITHIUM":[147],"demonstrated":[149],"best":[151],"while":[153],"also":[154],"having":[155],"smaller":[156],"loss":[158],"scaling":[160],"level.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
