Research on Key Exchange Protocol Based on LWE

2019 15th International Conference on Computational Intelligence and Security (CIS)(2019)

引用 1|浏览43
暂无评分
摘要
With the development of quantum computer, some cryptographic algorithms which are based on integers factorization and discrete logarithm become unsafe. Therefore it is necessary to research post-quantum cryptographic algorithms. In this paper, we mainly study post-quantum (authenticated) key exchangeprotocols. Especially, wefocusonlattice-basedprotocols where hard problem assumption can be reduced from worst-case to average-case. After research on NIST 2-round submission, key establishment schemes account for the majority and most schemes are based on lattice hard problem. LWE problem is an usual assumption. We will roughly introduce Kyber, LAC, FrodoKEM, NewHope, Threebears. How to choose a security model plays an important role for KE (or AKE) protocol. We mainly research on security, construction, efficiency, and innovation of these schemes.
更多
查看译文
关键词
lattice,LWE,security model,key-encapsulation mechanism (KEM),(authenticated) key exchange,signature
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要