ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2019, Vol. 56 ›› Issue (12): 2694-2701.doi: 10.7544/issn1000-1239.2019.20180874

Previous Articles     Next Articles

Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem

Li Zichen1,2, Xie Ting2, Zhang Juanmei3, Xu Ronghua3   

  1. 1(Beijing Institute of Graphic Communication, Beijing 102600);2(Communication Engineering Institute, Xidian University, Xi’an 710071);3(Beijing Electronic Science & Technology Institute, Beijing 100018)
  • Online:2019-12-01

Abstract: The rapid development of quantum computer technology poses serious threat to the security of the traditional public-key cryptosystem, and it is imperative to focus on designing and deploying post-quantum cryptosystems that can withstand quantum attacks. A post quantum authenticated key exchange (AKE) protocol based on ring learning with errors (RLWE) problem is proposed by using encryption construction method. First, introduce an IND-CPA secure public-key encryption scheme, which uses ciphertext compression technology. By applying a variant of the Fujisaki-Okamoto transform to create an IND-CCA secure key encapsulation mechanism. An authenticated key exchange protocol is proposed through implicit authentication, which is a provable security protocol under standard eCK model and can achieve weak perfect forward security. The protocol selects a centered binomial distribution as error distribution that has higher sampling efficiency, also sets reasonable parameters to ensure that both of parties to the communication obtain the same session key. The security of the protocol is 313 b tested by LWE tester. The protocol avoids the error-reconciliation mechanism originally proposed by Ding. Compared with the existing AKE protocol schemes based on difficult problems of lattice, the corresponding of communication is also significantly reduced. The protocol has smaller public key, private key and ciphertext size, and also it enjoys even stronger provable security guarantees. It is a more concise and efficient post-quantum AKE protocol.

Key words: lattice, post quantum, authenticated key exchange (AKE) protocol, ring learning with errors (RLWE), eCK model

CLC Number: