期刊文献+

辫子群上新的难解问题及其密码学应用研究 被引量:5

New Braid Intractable Problems and Cryptographical Applications
下载PDF
导出
摘要 利用Shor,Boneh和Lipton等的量子算法不仅可以在多项式时间内分解大整数,还可以有效解决离散对数和椭圆曲线上的离散对数问题,传统的基于这三类难解问题的公钥密码系统在量子计算机时代将变得不再安全.辫子群是一类较适合构造抵抗量子密码分析的计算平台,但目前基于辫子群的公钥密码系统所凭借的难解问题都得到了一定程度的解决.两类新的难解问题是根据p次方根问题的难解性和线性表示攻击提出的.在此基础上构造了一个新的密钥协商协议,分析了协议的安全性,给出了参数选择建议和理由.新的密钥协商协议可以抵抗目前已知的各种攻击. By using Shor, Boneh and Lipton's quantum algorithms, quantum computers can solve big integer factorization problems, discrete logarithm problems and discrete logarithm problems on elliptic curves, but public key cryptography systems based on these problems will become insecure in the age of quantum computers. It seems that braid group is a kind of considerable public key cryptography platform in the future. Solutions to the underlying intractable problems make all current braid cryptography systems look vulnerable. Two kinds of new intractable problems related to the p-th root finding problem and linear representation attacks are proposed to design a new key agreement protocol. Following the proposal of the parameter choice, the new protocol can resist all current known attacks.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第7期1246-1251,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60403027)
关键词 辫子群 方根 线性表示 公钥密码 密钥协商协议 braid group root finding linear representation public key cryptography key agreement protocol
  • 相关文献

参考文献18

  • 1P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Journal on Computing, 1997, 26(5) : 1484-1509
  • 2R. Boneh, R. Lipton. Quantum cryptanalysis of hidden linear functions [G]. In: Advances in Cryptology-Crypto'95, Lecture Notes in Computer Science 963. Berlin: Springer-Verlag, 1995.424 - 437
  • 3L. M. K. Vandersypen, M. Steffen, G. Breyta, et al.Experimental realization of Shor' s quantum factoring algorithm using nuclear magnetic resonance [J]. Nature, 2001, 414(6866) : 883-887
  • 4E. Artin. Theory of braids [J]. Ann. of Math. , 1947, 48(1):101 - 126
  • 5F. A. Garside. The braid group and other groups [J]. Quart. J.Math., 1969, 20(4): 235-254
  • 6K. H. Ko, S. J. Lee, J. H. Cheon, et al. New public-key cryptosystem using braid groups [G]. In: Advances in Cryptology-CRYPTO 2000, Lecture Notes in Computer Science 1880. Berlin:Springer-Verlag, 2000. 166-183
  • 7E. Lee, J. H. Park. Cryptanalysis of the public key encryption based on braid groups [G]. In: Advances in Cryptology-EuroCrypt 2003, Lecture Notes in Computer Science 2656.Berlin: Springer-Verlag, 2003. 477-490
  • 8V. B. Styshnev. The extraction of a root in a braid group(English)[J]. Math. USSR Izv, 1979, 13(2): 405-416
  • 9H. Sibert. Extraction of roots in Garside groups [J]. Comm.Algebra, 2002, 30(6) : 2915-2927
  • 10J. Gonzalez-Meneses. The n-th root of a braid is unique up to conjugacy [J]. Alg. Geom. Topology, 2003, 3:1103-1118

同被引文献24

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部