Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem
-
摘要: 量子计算机的迅速发展使得基于经典数论困难问题建立的现代公钥密码体制安全性面临严峻的威胁,设立和部署可抵御量子计算机攻击的后量子公钥密码系统势在必行.基于环上误差学习问题并使用加密的构造方式,设计了一种后量子认证密钥交换(authenticated key exchange,AKE)协议.首先利用密文压缩技术,提出了一个IND-CPA安全的公钥加密方案.之后在此方案的基础上,使用Fujisaki-Okamoto变换技术,得到了一种IND-CCA安全的密钥封装机制.通过隐式认证方式,构造了一个后量子AKE协议.此协议在标准eCK模型下可证明安全并可以达到弱的完美前向安全.采用LWE测试器进行了安全性测试,该协议安全度为313 b.与其他基于格上困难问题设计的AKE协议相比,安全度较高且通信量较低,是一种更加简洁高效的后量子AKE协议.Abstract: The rapid development of quantum computer technology poses serious threat to the security of the traditional public-key cryptosystem, and it is imperative to focus on designing and deploying post-quantum cryptosystems that can withstand quantum attacks. A post quantum authenticated key exchange (AKE) protocol based on ring learning with errors (RLWE) problem is proposed by using encryption construction method. First, introduce an IND-CPA secure public-key encryption scheme, which uses ciphertext compression technology. By applying a variant of the Fujisaki-Okamoto transform to create an IND-CCA secure key encapsulation mechanism. An authenticated key exchange protocol is proposed through implicit authentication, which is a provable security protocol under standard eCK model and can achieve weak perfect forward security. The protocol selects a centered binomial distribution as error distribution that has higher sampling efficiency, also sets reasonable parameters to ensure that both of parties to the communication obtain the same session key. The security of the protocol is 313 b tested by LWE tester. The protocol avoids the error-reconciliation mechanism originally proposed by Ding. Compared with the existing AKE protocol schemes based on difficult problems of lattice, the corresponding of communication is also significantly reduced. The protocol has smaller public key, private key and ciphertext size, and also it enjoys even stronger provable security guarantees. It is a more concise and efficient post-quantum AKE protocol.
-
-
期刊类型引用(7)
1. 姜磊,章小卫. 基于模糊隶属度邻域覆盖的三支分类决策. 计算机应用与软件. 2024(02): 271-278 . 百度学术
2. 骆公志,张尚蕾. 基于正区域和投票式属性重要度的特征提取算法. 南京邮电大学学报(自然科学版). 2024(01): 79-89 . 百度学术
3. 王笑笑,巴婧,陈建军,宋晶晶,杨习贝. 超约简求解:效率与性能的提升. 计算机科学. 2023(02): 166-172 . 百度学术
4. 刘长顺,刘炎,宋晶晶,徐泰华. 基于论域离散度的属性约简算法. 山东大学学报(理学版). 2023(05): 26-35+52 . 百度学术
5. 张清华,艾志华,张金镇. 融合密度与邻域覆盖约简的分类方法. 陕西师范大学学报(自然科学版). 2022(03): 33-42 . 百度学术
6. 沈毅波. RBF神经网络在关联数据一致性挖掘中的应用. 福建电脑. 2022(08): 5-9 . 百度学术
7. 周长顺,徐久成,瞿康林,申凯丽,章磊. 一种基于改进邻域粗糙集中属性重要度的快速属性约简方法. 西北大学学报(自然科学版). 2022(05): 745-752 . 百度学术
其他类型引用(7)
计量
- 文章访问数: 1011
- HTML全文浏览量: 2
- PDF下载量: 577
- 被引次数: 14