Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem

作者: Joppe W. Bos , Craig Costello , Michael Naehrig , Douglas Stebila

DOI: 10.1109/SP.2015.40

关键词: Security levelElliptic curveKey (lock)Cryptographic protocolDigital signatureLearning with errorsCryptographic primitivePublic-key cryptographyElliptic curve Diffie–HellmanComputer scienceCertificate authorityCipherDiffie–Hellman key exchangeComputer securityHypertext Transfer Protocol over Secure Socket LayerKey exchangeCryptographyQuantum cryptographyKey (cryptography)Forward secrecyTransport Layer SecurityAuthentication

摘要: … both ECDH and RLWE key exchange (for users who worry about the potential of quantum computers but still need to use ECDH … It should be noted that using R-LWE instead of ECDH …

参考文章(50)
Vadim Lyubashevsky, Chris Peikert, Oded Regev, A Toolkit for Ring-LWE Cryptography theory and application of cryptographic techniques. ,vol. 7881, pp. 35- 54 ,(2013) , 10.1007/978-3-642-38348-9_3
Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton, Tag size does matter: attacks and proofs for the TLS record protocol international conference on the theory and application of cryptology and information security. pp. 372- 389 ,(2011) , 10.1007/978-3-642-25385-0_20
Yuanmi Chen, Phong Q. Nguyen, BKZ 2.0: better lattice security estimates international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 1- 20 ,(2011) , 10.1007/978-3-642-25385-0_1
Tancrède Lepoint, Michael Naehrig, A Comparison of the Homomorphic Encryption Schemes FV and YASHE international conference on cryptology in africa. ,vol. 8469, pp. 318- 335 ,(2014) , 10.1007/978-3-319-06734-6_20
Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow, Elliptic Curve Cryptography in Practice Financial Cryptography and Data Security. pp. 157- 175 ,(2014) , 10.1007/978-3-662-45472-5_11
Jonathan Katz, Vinod Vaikuntanathan, Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices international conference on the theory and application of cryptology and information security. pp. 636- 652 ,(2009) , 10.1007/978-3-642-10366-7_37
Chris Peikert, Lattice Cryptography for the Internet International Workshop on Post-Quantum Cryptography. pp. 197- 219 ,(2014) , 10.1007/978-3-319-11659-4_12
Sheueling Chang Shantz, Douglas Stebila, Vipul Gupta, Nils Gura, Hans Eberle, Stephen Fung, Speeding up Secure Web Transactions Using Elliptic Curve Cryptography. network and distributed system security symposium. ,(2004)
Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen, Authenticated Key Exchange from Ideal Lattices theory and application of cryptographic techniques. pp. 719- 751 ,(2015) , 10.1007/978-3-662-46803-6_24
Dag Arne Osvik, Adi Shamir, Eran Tromer, Cache attacks and countermeasures: the case of AES the cryptographers track at the rsa conference. pp. 1- 20 ,(2006) , 10.1007/11605805_1