• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Xiufeng, Gao Haiying, Wang Ailan. An Identity-Based Authenticated Key Exchange Protocol from RLWE[J]. Journal of Computer Research and Development, 2016, 53(11): 2482-2490. DOI: 10.7544/issn1000-1239.2016.20150547
Citation: Zhao Xiufeng, Gao Haiying, Wang Ailan. An Identity-Based Authenticated Key Exchange Protocol from RLWE[J]. Journal of Computer Research and Development, 2016, 53(11): 2482-2490. DOI: 10.7544/issn1000-1239.2016.20150547

An Identity-Based Authenticated Key Exchange Protocol from RLWE

More Information
  • Published Date: October 31, 2016
  • Key exchange protocol allows two or more users to compute share session key via exchange information in the open communication channel, and uses the session key to finish cryptography tasks, such as secure communication and authentication. Recently, it becomes a hotspot research question that how to design authenticated key exchange protocol with lattice-based one-way function. Several lattice-based two-party authenticated key exchange protocols have been proposed. However, how to extend them to the identity-based cryptography background still remains open question. In this paper, an identity-based authenticated key exchange protocol from the learning with errors (LWE) problem over cyclotomic ring is proposed. The protocol generates master key by ring LWE (RLWE) sample algorithm, and further extracts the users’ secret key, and computes key materials which derive the share session key via exchanging Diffie-Hellman ephemeral key. The protocol introduces error item, uses encoding bases of ideal lattice as the tool for analyzing error tolerance, and makes reasonable suggests for parameters setting. The protocol achieves provable AKE secure and PKG forward secure in the ID-BJM model. Furthermore, the session key is also secure even if both long private keys are leaked or both ephemeral private key are leaked or A’s ephemeral key and B’s long private key are leaked.
  • Related Articles

    [1]Xue Xin, Zhu Tianchen, Sun Qingyun, Zhou Haoyi, Li Jianxin. Efficient Subgraph Matching Algorithm with Graph Neural Network[J]. Journal of Computer Research and Development, 2025, 62(3): 694-708. DOI: 10.7544/issn1000-1239.202330732
    [2]Shang Jing, Wu Zhihui, Xiao Zhiwen, Zhang Yifei. Graph4Cache: A Graph Neural Network Model for Cache Prefetching[J]. Journal of Computer Research and Development, 2024, 61(8): 1945-1956. DOI: 10.7544/issn1000-1239.202440190
    [3]Zhang Tianming, Xu Yiheng, Cai Xinwei, Fan Jing. A Shortest Path Query Method over Temporal Graphs[J]. Journal of Computer Research and Development, 2022, 59(2): 362-375. DOI: 10.7544/issn1000-1239.20210893
    [4]Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846
    [6]Lu Jianhua, Zhang Baili, Jiang Shan, Lu Ningyun, Wang Feifei. Selection-Verification-Filtering: An Iterative Subgraph Containment Query Processing Strategy[J]. Journal of Computer Research and Development, 2012, 49(10): 2221-2228.
    [7]Ou Xiaoping, Wang Chaokun, Peng Zhuo, Qiu Ping, and Bai Yiyuan. A Graph-Based Music Data Model and Query Language[J]. Journal of Computer Research and Development, 2011, 48(10): 1879-1889.
    [8]Zhang Xu, He Xiangnan, Jin Cheqing, and Zhou Aoying. Processing k-Nearest Neighbors Query over Uncertain Graphs[J]. Journal of Computer Research and Development, 2011, 48(10): 1871-1878.
    [9]Zhang Lin, Zhang Li. Software Superfamilies Based on Sub-Graph Significance Profile[J]. Journal of Computer Research and Development, 2011, 48(2): 251-258.
    [10]Li Zhoujun, Chen Yiming, Liu Junwan, Chen Huowang. A Survey of Computational Method in Protein-Protein Interaction Research[J]. Journal of Computer Research and Development, 2008, 45(12): 2129-2137.

Catalog

    Article views (1821) PDF downloads (592) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return