期刊文献+

后量子密码发展综述 被引量:2

A Survey on the Development of Post-Quantum Cryptography
下载PDF
导出
摘要 公钥密码学是保障现代通信安全与数据安全的重要基础技术。介绍了当前量子计算发展对公钥密码学造成的威胁,以及密码标准化组织和密码学研究的应对措施,依据所使用的基础数学困难问题分类阐述基于格、编码、多变量、哈希函数、曲线同源的后量子密码及其优劣势等特点。以当前后量子密码标准进展为主线,从算法安全性分析、后量子迁移的技术路线、与量子通信技术结合、新的数学困难问题探索等方面提出后量子密码学的发展方向建议。 Public key cryptography is a significant and fundamental technique to ensure security of modern communication and data.This paper introduces the threat to public key cryptography posed by the current development of quantum computing and the countermeasures of cryptography standardization organizations and cryptography community,and then according to the basic mathematical difficult problems used,elaborates the characteristics of post-quantum cryptography based on lattice,encoding,multivariate equations, hash function, curve isogeny and their advantages and disadvantages in categories.Based on the present progress of post-quantum cryptography standardization, this paper puts forward thedevelopment direction of post-quantum cryptography from the aspects of algorithm security analysis,technical route of post-quantum migration, combination with quantum communication technology, andexploration of new difficult mathematical problems.
作者 孙奥 何银 李海波 张云蓓 SUN Ao;HE Yin;LI Haibo;ZHANG Yunbei(No.30 Institute of CETC,Chengdu Sichuan 610041,China;Science and Technology on Communication Security Laboratory,Chengdu Sichuan 610041,China)
出处 《信息安全与通信保密》 2023年第9期27-35,共9页 Information Security and Communications Privacy
基金 国家重点研发计划项目“抗量子计算的加密体系及安全机理研究”(No.2021YFB3100200)。
关键词 公钥密码 量子计算 后量子密码 后量子迁移 public key cryptography quantum computing post-quantum cryptography post-quantum migration
  • 相关文献

参考文献6

二级参考文献18

  • 1王新梅,李元兴,武传坤.McEliece公钥体制的修正[J].电子学报,1994,22(4):90-92. 被引量:4
  • 2HOFFSTEIN J,PIPHER J,SILVERMAN J H.NTRU:a new highspeed public key cryptosystem[C]// Algorithm Number Theory-ANTS III.Berlin:Springer-Verlag,1998:267-288.
  • 3MICCIANCIO D.Generalized compact knapsacks,cyclic lattices,and effcient one-way functions[J].Computational Complexity,1997,16(4):365-411.
  • 4HOFFSTEIN J,PIPHER J,SILVERMAN J H.NSS:the NTRUsignature scheme[C]// Proceedings of Cryptology Eurocrypt 2001.Berlin:Springer-Verlag,1997:211-228.
  • 5HOFFSTEIN J,PIPHER J,SILVERMAN J H.NSS:an NTRU lat-tice-based signature scheme[C]// Proceedings of Cryptology Euro-crypt 2001.Berlin:Springer-Verlag,2001:123-137.
  • 6CASH D,HOFHEINZ D.Bonsai trees,or how to delegate a latticebasis[C]// Proceedings of the 29 th Annual International Conferenceon Theory and Applications of Cryptographic Techniques.Beilin:Springer-Verlag,2010:523-552.
  • 7CHANG C C,CHANG Y F.Signing a digital signature without u-sing one-way Hash functions and message redundancy schemes[J].IEEE Communications Letters,2004,8(8):485-487.
  • 8FIAT A,SHAMIR A.How to prove yourself:practical solutions toidentification and signature problems[C]// Proceedings of Cryptol-ogy Eurocrypt 1986.London:Springer-Verlag,1987:186-194.
  • 9PEIKERT C,WATERS B.Lossy trapdoor functions and their ap-plications[C]// Proceedings of the 40th ACM Symposium on Theo-ry of Computing.New York:ACM Press,2008:187-196.
  • 10MICCIANCIO D,REGEV 0.Lattice-based cryptography[EB /OL].[2013-08-20].http://www.cims.nyu.edu/ - regev/pa-pers/pqc.pdf.

共引文献14

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部