Tidecoin

Lattice Based Encryption Example

This article should give a short example, how lattice based encryptions are working.
Following parameters are given. n is the number of matrixes, which are choosen. k is the dimension of every matrix and q must be a prime number, to limit the size of fields.

Alice will choose a Matrix A. This is her public key.

She will also choose here secret key s.

Now Alice will choose a random vector e.

Alice will calculate t with her public key A, her secret key S and her random vector e.

Bob will receive A and t from Alice.
Bob will choose a random vector r, e1, e2 and he will select the message M he like to send.

Bob will now calculate an encryption and a kind of helper encryption output for Alice.

Now Bob will calculate his secret message.

Alice will decript the message with using u and v from Bob and her private key s.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Related Posts

Quantum Computer Science

Quantum circuits researchers explore quantum circuits to make it easier for quantum computers to perform mathematical problems. In general, it can be said that almost

Falcon Signature

This article discusses the Falcon cryptographic signature algorithm, which has been selected by NIST as a post-quantum cryptography standard. Falcon is based on the theoretical

Simply Tidecoin Mining

As mentioned in other articles, Tidecoin mining algorithm is ASIC’s neutral and gpu unfriendly. Therefore, private devices can be used excellently to mine the coin.Tidecoin

Closest Vector Problem

Tidecoin uses FALCON as the signature algorithm for the signature. FALCON uses a lattice-based approach.This article aims to briefly outline what mathematical problem is behind

Technical Characteristics of the Signature

Both new NIST crypto standards for signatures (FALCON and CRYSTALS-Dilithium) are particularly suitable for time-critical applications. [page 2] Both are based on the lattice-based cryptography

Shor Algorithm- the nightmare for ECDSA

“The famous Shor algorithm allows an opponent to break ECDSA by a quantum computer that is sufficiently efficient.” page 269,  Koustav Kumar Mondal  and  Deepsubhra

Lattice Based Encryption Example

This article should give a short example, how lattice based encryptions are working. Following parameters are given. n is the number of matrixes, which are

TIDECOIN is a new future

The World Economic Forum estimates that by 2025, at least 10% of the world’s GDP, currently at USD 100 trillion, will be managed via Blockchain