期刊文献+

一种改进的辫子群上的密钥协商协议 被引量:1

An Improved Key Agreement Protocol on Braid Groups
下载PDF
导出
摘要 由Shor,Boneh和Liptonon等人发现的、可在量子多项式时间内解决大整数分解、离散对数和椭圆曲线上的离散对数问题的量子算法使得当前以这些“难解”问题为基础的传统公钥密码体制受到挑战。辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,但是目前基于辫子群的密钥协商协议AAG、AAFG和BDH等都有不同程度的安全弱点。本文利用随机化辫子和非共轭变换技术,在AAG和AAFG密钥协商协议的基础上,提出了一种改进的辫子群上的密钥协商协议,用于在非保密信道上安全协商共享密钥。该协议可以抵抗目前已知的长度攻击、线性表示攻击和各种基于共轭搜索方法的攻击。 Shor,Boneh,Liptonon et al. present some remarkable quantum algorithms which can solve integer factoring problem, discrete logarithm problem and discrete logarithm problem on elliptic curves in quantum polynomial time. These quantum algorithms are great challenges to classical public key cryptographies based on the above-described hard problems. It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG,AAFG and BDH, all have different degrees of security weaknesses. This paper takes advantage of random braids and non-conjugate transformations to present an improved braid key agreement protocol relat ed to AAG and AAFG, which can make the two communication parties securely share a common key over any insecure channel. This protocol can resists current length-based attacks, linear representation attacks and other conjugacy search attacks.
出处 《计算机科学》 CSCD 北大核心 2006年第8期121-125,共5页 Computer Science
基金 国家自然科学基金(60TP3027) 湖北省自然科学基金(2005ABA243)资助项目
关键词 辫子群 密钥协商协议 共轭 公钥密码 Braid group,Key agreement protocol,Conjugate,Public key cryptography
  • 相关文献

参考文献14

  • 1Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 1997,26:1484-1509
  • 2Boneh R, Lipton R. Quantum cryptanalysis of hidden linear functions. Advances in Cryptology-Crypto'95. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1995, 963 :424-437
  • 3Artin E. Theory. of Braids. Ann of Math, 1974,48:101-126
  • 4Anshel I,Anshel M,Goldfeld D. An Algebraic Method for-Publickey Cryptography. Mathematical Research Letters, 1999,6 : 1- 5
  • 5Hofheinz D, Steinwandt R. A Practical Attack on Some Braid Group Based Cryptographic Primitives, In:Desmedt Y G, ed.Public Key Cryptography-PKC 2003,Lecture Notes in Computer Science 2567, Berlin:Springer-Verlag,2003. 187-198
  • 6Lee S J,Lee E. Potential weakness of the commutator key agreement protocol based on braid groups. In.. Knudsen L, ed. Advances in Cryptology-EUROCRYPT 2002,Lecture Notes in Computer Science 2332, Berlin:Springer-Verlag,2002. 14-18
  • 7Anshel I, Anshel M, Fisher B, et-al. New-Key Agreement Protocols in Braid Group Cryptography. In: Naccache D, ed. Topics in Cryptology-CT-RSA 2001, Lecture Notes in Computer Science 2020, Berlin: Springer-Verlag, 2001.13- 27
  • 8Hughes J. A linear algebraic attack on the AAFG1 braid group cryptosystem In: Batten L, Seberry J, eds. Information Security and Privacy -7th Australian Conference, ACISP 2002, Lecture Notes in Computer Science 2384, Berlin: Springer-Verlag, 2002.176-189
  • 9El-Rifai E A,Morton HR. Algorithms for positive braids. Quart J Math Oxford Ser, 1994, 45 (2) : 479-497
  • 10Dehornoy P. Braid-based cryptography. Contemporary Mathematics, 2004,360:5-33

同被引文献8

  • 1汤学明,洪帆,崔国华.辫子群上新的难解问题及其密码学应用研究[J].计算机研究与发展,2006,43(7):1246-1251. 被引量:5
  • 2Anshel I, Anshel M. From the Post-markov Decision Problems to Public-key Cryptography[J]. American Mathematical Monthly, 1993, 100(9): 835-845.
  • 3Verma G. A Proxy Blind Signature Schemes over Braid Groups[J]. International Journal of Network Security, 2009, l9(3): 214-217.
  • 4Shor P W. Polynomial Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.
  • 5Artin E. Theory of Braids[J]. The Annals of Mathematics, 1947, 48(1): 101-126.
  • 6Yuji Moriwaki, Tetsuya Yamamoto, Kei Yamaguchi. Immunohistochemical Iocalization of aldehyde and xanthine oxidase in rat tissues using polyclonal antibodies. Histochem Cell Biol, 1996,105:71 - 79
  • 7隗云,熊国华,鲍皖苏,张兴凯.辫群上新的签名体制[J].电子与信息学报,2010,32(12):2930-2934. 被引量:2
  • 8韩维维,何德彪.可证安全的椭圆曲线同源密钥协商协议[J].计算机工程,2011,37(1):128-130. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部