期刊文献+

同源密码方案综述

A Survey of Isogeny-Based Cryptographic Schemes
下载PDF
导出
摘要 基于超奇异椭圆曲线同源构造的密码体制作为后量子密码的重要分支,因其较小的密钥尺寸和良好的抗量子特性,成为一个很有潜力的发展方向.本文对同源密码进行了简要概述,总结同源密码底层的数学困难问题;整理了近年来基于椭圆曲线同源构造的不同密码方案,分别从两方密钥交换、组密钥交换、数字签名、不经意传输和公钥加密等方面介绍国内外同源密码发展现状;总结了该领域一些需要重点解决的问题,对同源密码未来发展前景进行展望. Cryptosystems based on supersingular elliptic curve isogenies is a class of the most important post-quantum cryptosystems.Due to their small key size and good post-quantum properties,isogeny-based cryptosystems have become promising candidates in PQC standardization.This paper gives a brief overview of isogeny-based cryptosystems and summarizes the underlying mathematical problems.This paper also classifies recent isogeny-based cryptographic schemes,surveys the current research results,and traces their development in detail following their categories such as two-party key exchange,group key exchange,digital signature,oblivious transfer and public key encryption.Finally,some important problems that need to be solved in this field are summarized,and the future development prospect is discussed.
作者 刘一丹 程庆丰 LIU Yi-Dan;CHENG Qing-Feng(School of Cyber Science and Technology,Information Engineering University,Zhengzhou 450001,China)
出处 《密码学报》 CSCD 2023年第4期667-684,共18页 Journal of Cryptologic Research
基金 国家自然科学基金(61872449,62172433)。
关键词 同源密码 后量子密码 超奇异同源Diffie-Hellman isogeny-based cryptography post-quantum cryptography supersingular isogeny DiffieHellman
  • 相关文献

参考文献4

二级参考文献15

  • 1BONEH D, LIPTON R. Quantum cryptanalysis of hidden linear functions[ C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology (LNCS 963). London: Springer-Verlag, 1995: 424-437.
  • 2JEFF J, JILL P, SILVERMAN J H. NTRU: a new high speed public key cryptosystem[ C] //Proc of ANTS III. Berlin: Springer-Verlag, 1998 : 267-288.
  • 3NICK H. A hybrid lattice-reduction and meet-in-the-middle attack against ntru [ C ]// Advances in Cryptology-CRYPTO2007 ( LNCS 4622). Berlin: Springer-Verlag, 2007 : 150-169.
  • 4JEFF J, NICK H, JILL P, et al. Practical lattice-based cryptography : ntruencrypt and ntrusign [ EB/OL ]. [ 2007- 07- 0l ]. http : //www. ntru. com/cryptolab/pdf/U125, pdf.
  • 5MENEZES A J, VANSTONE S A, van OORSCHOT P C. Handbook of applied cryptography[ M ] . [ S. l ] : CRC Press, 1996 : 298-299.
  • 6PATARIN J. Asymmetric cryptography with a hidden monomial[ C]//Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (LNCS 1109). London: Springer-Verlag, 1996: 45-60.
  • 7KASSEL C, TURAEV V. Braid groups[Ml. [S.1. ]: Springer, 2008: 1-40.
  • 8ROSTOVTSEV A, STOLBUNOV A. Public-key cryptosystem based on isogenies [ EB/OL]. [ 2006-05-29 ]. http://eprint. iacr. org/.
  • 9KOHEL D. Endomorphism rings of elliptic curves over finite fields[ D]. Berkeley: University of California, 1996: 2-3.
  • 10COUVEIGNES J M, DEWAGHE L, MORAIN F. Isogeny cycles and the schoof-elkies-atkin algorithm[ EB/OL]. [ 1996-04- 26 ]. http : //www. lix. polytechnique, fr/Labo/Francois. Morain/.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部