{"id":"https://openalex.org/W4210798802","doi":"https://doi.org/10.1109/tit.2022.3148586","title":"Compact and Flexible KEM From Ideal Lattice","display_name":"Compact and Flexible KEM From Ideal Lattice","publication_year":2022,"publication_date":"2022-02-01","ids":{"openalex":"https://openalex.org/W4210798802","doi":"https://doi.org/10.1109/tit.2022.3148586"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2022.3148586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3148586","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005453022","display_name":"Zhengzhong Jin","orcid":"https://orcid.org/0000-0002-2233-3768"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Zhengzhong Jin","raw_affiliation_strings":["Department of Computer Science, Fudan University, Shanghai, China","Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]},{"raw_affiliation_string":"Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034248328","display_name":"Shiyu Shen","orcid":"https://orcid.org/0000-0001-7287-4223"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiyu Shen","raw_affiliation_strings":["Department of Computer Science, Fudan University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-7287-4223","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101712881","display_name":"Yunlei Zhao","orcid":"https://orcid.org/0000-0002-2623-9170"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlei Zhao","raw_affiliation_strings":["Department of Computer Science, Fudan University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-2623-9170","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005453022"],"corresponding_institution_ids":["https://openalex.org/I145311948","https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.6937,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.740764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"68","issue":"6","first_page":"3829","last_page":"3840"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.75555419921875},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.7449314594268799},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6839423179626465},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.5926347970962524},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5800140500068665},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5566196441650391},{"id":"https://openalex.org/keywords/conjecture","display_name":"Conjecture","score":0.5182490348815918},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5075443983078003},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4703167974948883},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46114498376846313},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.43131351470947266},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4275626838207245},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.41231569647789},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.40711426734924316},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3650836944580078},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2538653612136841},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.1616358458995819},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1490914225578308}],"concepts":[{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.75555419921875},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.7449314594268799},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6839423179626465},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.5926347970962524},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5800140500068665},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5566196441650391},{"id":"https://openalex.org/C2780990831","wikidata":"https://www.wikidata.org/wiki/Q319141","display_name":"Conjecture","level":2,"score":0.5182490348815918},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5075443983078003},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4703167974948883},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46114498376846313},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.43131351470947266},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4275626838207245},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.41231569647789},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.40711426734924316},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3650836944580078},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2538653612136841},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.1616358458995819},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1490914225578308},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2022.3148586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2022.3148586","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2735831771","display_name":null,"funder_award_id":"U1536205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3893354201","display_name":null,"funder_award_id":"61572198","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G650750474","display_name":null,"funder_award_id":"61972159","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7671192633","display_name":null,"funder_award_id":"16JC1400801","funder_id":"https://openalex.org/F4320313610","funder_display_name":"Shanghai Science and Technology Development Foundation"},{"id":"https://openalex.org/G7991443049","display_name":null,"funder_award_id":"61472084","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8170696387","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320313610","display_name":"Shanghai Science and Technology Development Foundation","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W31130112","https://openalex.org/W1589034595","https://openalex.org/W1871739018","https://openalex.org/W1982227476","https://openalex.org/W1995261385","https://openalex.org/W2007466965","https://openalex.org/W2059894101","https://openalex.org/W2098290658","https://openalex.org/W2102632861","https://openalex.org/W2106970188","https://openalex.org/W2113333997","https://openalex.org/W2113992957","https://openalex.org/W2119352491","https://openalex.org/W2179033149","https://openalex.org/W2301261742","https://openalex.org/W2407452345","https://openalex.org/W2514893051","https://openalex.org/W2626019822","https://openalex.org/W2740966734","https://openalex.org/W2796314191","https://openalex.org/W2866028610","https://openalex.org/W2902661060","https://openalex.org/W2915352631","https://openalex.org/W2947797347","https://openalex.org/W2958917282","https://openalex.org/W2960496836","https://openalex.org/W2972939487","https://openalex.org/W2990055785","https://openalex.org/W3023177310","https://openalex.org/W3032199016","https://openalex.org/W3100495456","https://openalex.org/W3137525851","https://openalex.org/W4233022137","https://openalex.org/W4240339612","https://openalex.org/W4292414116","https://openalex.org/W6724049718","https://openalex.org/W6730204399","https://openalex.org/W6773760307","https://openalex.org/W6980824345"],"related_works":["https://openalex.org/W2948977325","https://openalex.org/W2935786241","https://openalex.org/W2398538644","https://openalex.org/W3094954003","https://openalex.org/W3135609965","https://openalex.org/W2045983470","https://openalex.org/W2978075708","https://openalex.org/W3009555975","https://openalex.org/W3168932674","https://openalex.org/W4289542210"],"abstract_inverted_index":{"A":[0],"remarkable":[1],"breakthrough":[2],"in":[3,5,17,28,38,198],"mathematics":[4],"recent":[6],"years":[7],"is":[8,26],"the":[9,12,18,29,32,84,89,101,106,138,158,167,196,208,212],"proof":[10],"of":[11,31,105,109,127,140,169,190],"long-standing":[13],"conjecture:":[14],"sphere":[15,36],"packing":[16,37],"<inline-formula":[19,39],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[20,40],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[21,41],"<tex-math":[22,42],"notation=\"LaTeX\">$E_{8}$":[23],"</tex-math></inline-formula>":[24,45],"lattice":[25,86],"optimal":[27],"sense":[30],"best":[33],"density":[34],"for":[35,54,65],"notation=\"LaTeX\">$\\mathbb":[43],"{R}^{8}$":[44],".":[46],"In":[47],"this":[48],"work,":[49],"we":[50,75],"design":[51],"a":[52,72,77,148],"mechanism":[53,81],"asymmetric":[55],"key":[56,69,79,159,176,191,214],"consensus":[57],"from":[58,83],"noise":[59],"(AKCN),":[60],"referred":[61],"to":[62,206],"as":[63],"AKCN-E8,":[64],"error":[66],"correction":[67],"and":[68,111,125,144,187,193],"consensus.":[70],"As":[71],"direct":[73],"application,":[74],"present":[76],"practical":[78],"encapsulation":[80],"(KEM)":[82],"ideal":[85],"based":[87,136],"on":[88,137],"ring":[90],"learning":[91],"with":[92,97,130],"errors":[93],"(RLWE)":[94],"problem.":[95],"Compared":[96,129],"NewHope-KEM":[98],"that":[99],"was":[100],"second":[102],"round":[103],"candidate":[104],"National":[107],"Institute":[108],"Standards":[110],"Technology":[112],"(NIST)":[113],"post-quantum":[114],"cryptography":[115],"(PQC)":[116],"standardization,":[117],"our":[118],"AKCN-E8":[119,146],"KEM":[120,134],"scheme":[121],"overcomes":[122],"some":[123,131],"limitations":[124],"shortcomings":[126],"NewHope-KEM.":[128],"other":[132],"dominating":[133],"schemes":[135],"variants":[139],"LWE,":[141],"specifically":[142],"Kyber":[143],"Saber,":[145],"has":[147,166],"comparable":[149],"performance":[150],"but":[151],"enjoys":[152],"much":[153],"flexible":[154],"shared-key":[155],"sizes.":[156],"Specifically,":[157],"encapsulated":[160],"by":[161],"AKCN-E8-512":[162],"(resp.,":[163,171],"768,":[164],"1024)":[165],"size":[168,177],"256":[170],"384,":[172],"512)":[173],"bits.":[174],"Flexible":[175],"renders":[178],"us":[179],"stronger":[180],"security":[181,209],"against":[182],"quantum":[183],"attacks,":[184],"more":[185],"powerful":[186],"economic":[188],"ability":[189],"transportation,":[192],"better":[194],"matches":[195],"demand":[197],"interactive":[199],"protocols":[200],"like":[201],"TLS":[202],"where":[203],"parties":[204],"need":[205],"negotiate":[207],"parameters":[210],"including":[211],"shared":[213],"length.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
