{"id":"https://openalex.org/W7128692538","doi":"https://doi.org/10.3390/cryptography10010010","title":"Some Mathematical Problems Behind Lattice-Based Cryptography","display_name":"Some Mathematical Problems Behind Lattice-Based Cryptography","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128692538","doi":"https://doi.org/10.3390/cryptography10010010"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010010","pdf_url":"https://www.mdpi.com/2410-387X/10/1/10/pdf?version=1770899763","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/1/10/pdf?version=1770899763","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101658433","display_name":"Chuanming Zong","orcid":"https://orcid.org/0000-0003-1063-5918"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuanming Zong","raw_affiliation_strings":["Center for Applied Mathematics, Tianjin University, Tianjin 300072, China"],"raw_orcid":"https://orcid.org/0000-0003-1063-5918","affiliations":[{"raw_affiliation_string":"Center for Applied Mathematics, Tianjin University, Tianjin 300072, China","institution_ids":["https://openalex.org/I162868743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101658433"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":26.7839,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98722119,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"10","issue":"1","first_page":"10","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9556999802589417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9556999802589417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.016699999570846558,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6908000111579895},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.6097999811172485},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6047999858856201},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.48730000853538513},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4756999909877777},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.4278999865055084},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4269999861717224},{"id":"https://openalex.org/keywords/strong-cryptography","display_name":"Strong cryptography","score":0.4235000014305115},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.391400009393692}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6908000111579895},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.6097999811172485},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6047999858856201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5238999724388123},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5228999853134155},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4756999909877777},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.4278999865055084},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.4235000014305115},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.391400009393692},{"id":"https://openalex.org/C168482242","wikidata":"https://www.wikidata.org/wiki/Q6497128","display_name":"Lattice problem","level":3,"score":0.3756999969482422},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3725999891757965},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.35019999742507935},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3499000072479248},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.3472000062465668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34700000286102295},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.32839998602867126},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30160000920295715},{"id":"https://openalex.org/C66783780","wikidata":"https://www.wikidata.org/wiki/Q1166625","display_name":"Mathematical problem","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C19754495","wikidata":"https://www.wikidata.org/wiki/Q3435924","display_name":"Computational problem","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.2770000100135803},{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.27410000562667847},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.25780001282691956},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2533000111579895},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2524000108242035},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2517000138759613},{"id":"https://openalex.org/C130327152","wikidata":"https://www.wikidata.org/wiki/Q748349","display_name":"Mathematical structure","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010010","pdf_url":"https://www.mdpi.com/2410-387X/10/1/10/pdf?version=1770899763","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:098172f416af42809be91713ade55292","is_oa":false,"landing_page_url":"https://doaj.org/article/098172f416af42809be91713ade55292","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 1, p 10 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010010","pdf_url":"https://www.mdpi.com/2410-387X/10/1/10/pdf?version=1770899763","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4296209216117859}],"awards":[{"id":"https://openalex.org/G1157120655","display_name":null,"funder_award_id":"NSFC12226006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1828425977","display_name":null,"funder_award_id":"973 Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3295629273","display_name":null,"funder_award_id":"2013CB834201","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4614967455","display_name":null,"funder_award_id":"2013CB834201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4800798109","display_name":null,"funder_award_id":"NSFC11921001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128692538.pdf","grobid_xml":"https://content.openalex.org/works/W7128692538.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W1499237070","https://openalex.org/W1515987896","https://openalex.org/W1598269861","https://openalex.org/W1675339804","https://openalex.org/W1842400606","https://openalex.org/W1886646278","https://openalex.org/W1967222679","https://openalex.org/W1989510734","https://openalex.org/W2013794527","https://openalex.org/W2036378739","https://openalex.org/W2050657146","https://openalex.org/W2051176401","https://openalex.org/W2056492141","https://openalex.org/W2061949491","https://openalex.org/W2077244027","https://openalex.org/W2092901733","https://openalex.org/W2106954965","https://openalex.org/W2108834246","https://openalex.org/W2111416661","https://openalex.org/W2133465710","https://openalex.org/W2141040012","https://openalex.org/W2153463241","https://openalex.org/W2156186849","https://openalex.org/W2301261742","https://openalex.org/W2333414470","https://openalex.org/W2334989808","https://openalex.org/W2499479809","https://openalex.org/W2952116694","https://openalex.org/W3014312596","https://openalex.org/W3100495456","https://openalex.org/W3102063203","https://openalex.org/W4205300920","https://openalex.org/W4205615689","https://openalex.org/W4205765479","https://openalex.org/W4206558398","https://openalex.org/W4232836212","https://openalex.org/W4241420023","https://openalex.org/W4292408570","https://openalex.org/W4313458384","https://openalex.org/W4389154922","https://openalex.org/W4391901755","https://openalex.org/W4405331036","https://openalex.org/W4406744118","https://openalex.org/W4408089387","https://openalex.org/W4412102625"],"related_works":[],"abstract_inverted_index":{"In":[0,18,38,69],"1994,":[1],"P.":[2],"Shor":[3],"discovered":[4],"quantum":[5,24,66],"algorithms":[6,60],"that":[7,171],"can":[8,173],"break":[9],"both":[10,141],"the":[11,15,22,40,62,93,106,110,115,127,134,142,161],"RSA":[12],"cryptosystem":[13],"and":[14,28,45,54,78,92,120,133,144,177],"ElGamal":[16],"cryptosystem.":[17],"2007,":[19],"D-Wave":[20],"demonstrated":[21],"first":[23,85],"computer.":[25],"These":[26],"events":[27],"further":[29],"developments":[30],"have":[31],"brought":[32],"a":[33,49,56,96,130,137],"crisis":[34],"to":[35,52,64,148],"secret":[36],"communication.":[37],"2016,":[39],"National":[41],"Institute":[42],"of":[43,58,101,109],"Standards":[44],"Technology":[46],"(NIST)":[47],"launched":[48],"global":[50],"project":[51],"solicit":[53],"select":[55],"handful":[57],"encryption":[59],"with":[61],"ability":[63],"resist":[65],"computer":[67],"attacks.":[68],"2022,":[70],"it":[71],"announced":[72],"four":[73],"candidates,":[74],"CRYSTALS-Kyber,":[75],"CRYSTALS-Dilithium,":[76],"Falcon,":[77],"Sphincs+,":[79],"for":[80,151],"post-quantum":[81],"cryptography":[82,167],"standards.":[83],"The":[84,99],"three":[86],"are":[87,146],"based":[88],"on":[89,95,105,164],"lattice":[90],"theory":[91],"last":[94],"hash":[97],"function.":[98],"security":[100],"lattice-based":[102,166],"cryptosystems":[103],"relies":[104],"computational":[107],"complexity":[108],"shortest":[111],"vector":[112,117],"problem":[113,118],"(SVP),":[114],"closest":[116],"(CVP),":[119],"their":[121,175],"generalizations.":[122],"As":[123],"we":[124],"will":[125,158],"explain,":[126],"SVP":[128,143],"is":[129,136,168],"ball-packing":[131],"problem,":[132],"CVP":[135,145],"ball-covering":[138],"problem.":[139],"Furthermore,":[140],"equivalent":[147],"arithmetic":[149],"problems":[150,163],"positive":[152],"definite":[153],"quadratic":[154],"forms.":[155],"This":[156],"paper":[157],"briefly":[159],"describe":[160],"mathematical":[162],"which":[165],"built":[169],"so":[170],"cryptographers":[172],"extend":[174],"views":[176],"learn":[178],"something":[179],"useful.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-17T08:19:37.847499","created_date":"2026-02-13T00:00:00"}
