高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种新型基于环上带误差学习问题的认证密钥交换方案

杨孝鹏 马文平 张成丽

杨孝鹏, 马文平, 张成丽. 一种新型基于环上带误差学习问题的认证密钥交换方案[J]. 电子与信息学报, 2015, 37(8): 1984-1988. doi: 10.11999/JEIT141506
引用本文: 杨孝鹏, 马文平, 张成丽. 一种新型基于环上带误差学习问题的认证密钥交换方案[J]. 电子与信息学报, 2015, 37(8): 1984-1988. doi: 10.11999/JEIT141506
Yang Xiao-peng, Ma Wen-ping, Zhang Cheng-li. New Authenticated Key Exchange Scheme Based on Ring Learning with Errors Problem[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1984-1988. doi: 10.11999/JEIT141506
Citation: Yang Xiao-peng, Ma Wen-ping, Zhang Cheng-li. New Authenticated Key Exchange Scheme Based on Ring Learning with Errors Problem[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1984-1988. doi: 10.11999/JEIT141506

一种新型基于环上带误差学习问题的认证密钥交换方案

doi: 10.11999/JEIT141506
基金项目: 

国家自然科学基金(61072140, 61373171),高等学校博士学科点专项科研基金(20100203110003),高等学校创新引智计划项目(B08038),十二五国家密码发展基金(MMJJ201401003)和华为技术有限公司合作项目(YB2013120005)

New Authenticated Key Exchange Scheme Based on Ring Learning with Errors Problem

  • 摘要: 利用格上判定带误差学习问题(Ring-DLWE)困难假设,该文基于Peikert的调和技术构造认证密钥交换方案。在标准模型下,该方案是CK模型中可证明安全的,并达到弱前向安全性(wPFS)。与现有的基于LWE的密钥交换方案相比,该方案使用平衡的密钥提取函数,因而保护共享会话密钥,同时因其基于格中困难问题,所以能抵抗量子攻击。
  • Gentry C, Peikert C, and Vaikuntanathan V. Trapdoor for hard lattices and new cryptographic constructions[C]. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 2008: 197-206.
    Regev O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM, 2009, DOI: 10.1145/1568318.1568324.
    Peikert C. Public-key cryptosystems for the worst-case shortest vector problem[C]. Proceedings of the 41th Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 2009: 333-342.
    Lyubashevsky V, Peikert C, and Regev O. On ideal lattices and learning with errors over rings[C]. Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, France, 2010: 1-23.
    Benny A, David C, and Peikert C. Fast cryptographic primitives and circular-secure encryption based on hard learning problems[C]. Proceedings of the 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2009: 595-618.
    Fujioka A, Suzuki K, Xagawa K, et al.. Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism[C]. Proceedings of the 8th ACM Symposium on Information, Computer, and Communication Security, Hangzhou, China, 2013: 83-94.
    胡学先, 魏江宏, 叶茂, 等. 对一个强安全的认证密钥交换协议的分析[J]. 电子与信息学报, 2013, 35(9): 2278-2282.
    Hu Xue-xian, Wei Jiang-hong, Ye Mao, et al.. Cryptanalysis of a strongly secure authenticated key exchange protocol[J]. Journal of Electronics Information Technology, 2013, 35(9): 2278-2282.
    Lyubashevsky V, Peikert C, and Regev O. A toolkit for ring-LWE cryptography[C]. Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 2013: 35-54.
    Peikert C. Lattice cryptography for the Internet[C]. Proceedings of the 6th International Workshop, Post-Quantum Cryptography, Waterloo, Canada, 2014: 197-219.
    Peikert C. An efficient and parallel gaussian sampler for lattices[C]. Proceedings of the 30th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2010: 80-97.
    Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels[C]. Proceedings of the 20th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Innsbruck, Austria, 2001: 453-474.
  • 加载中
计量
  • 文章访问数:  1326
  • HTML全文浏览量:  131
  • PDF下载量:  751
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-11-27
  • 修回日期:  2015-02-19
  • 刊出日期:  2015-08-19

目录

    /

    返回文章
    返回