Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism

作者: Atsushi Fujioka , Koutarou Suzuki , Keita Xagawa , Kazuki Yoneyama

DOI: 10.1145/2484313.2484323

关键词:

摘要: This paper discusses how to realize practical post-quantum authenticated key exchange (AKE) with strong security, i.e., CK+ security (Krawczyk, CRYPTO 2005). It is known that strongly secure AKE protocols exist on a generic construction from IND-CCA encapsulation mechanisms (KEMs) in the standard model.However, when it instantiated existing KEMs, resultant are far communication complexity. We propose of OW-CCA KEMs and prove random oracle model. exploit instantiate various assumptions; DDH, gap DH, CDH, factoring, RSA, DCR, (ring-)LWE, McEliece one-way, NTRU subset sum, multi-variate quadratic systems, more. For example, costs our lattice-based scheme approximately 14 times lower than previous instantiation (for 128-bit security). Also, case code-based scheme, 25 lower.

参考文章(53)
Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti, Efficient implementation of a CCA2-Secure variant of mceliece using generalized srivastava codes public key cryptography. pp. 138- 155 ,(2012) , 10.1007/978-3-642-30057-8_9
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang, Public-Key cryptography from new multivariate quadratic assumptions public key cryptography. pp. 190- 205 ,(2012) , 10.1007/978-3-642-30057-8_12
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry, Random oracles in a quantum world international conference on the theory and application of cryptology and information security. pp. 41- 69 ,(2011) , 10.1007/978-3-642-25385-0_3
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa, Efficient Public Key Encryption Based on Ideal Lattices international conference on the theory and application of cryptology and information security. pp. 617- 635 ,(2009) , 10.1007/978-3-642-10366-7_36
Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento, A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model the cryptographers track at the rsa conference. pp. 240- 251 ,(2009) , 10.1007/978-3-642-00862-7_16
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert, Bonsai trees, or how to delegate a lattice basis theory and application of cryptographic techniques. pp. 523- 552 ,(2010) , 10.1007/978-3-642-13190-5_27
Tatsuaki Okamoto, Authenticated key exchange and key encapsulation in the standard model international conference on the theory and application of cryptology and information security. pp. 474- 484 ,(2007) , 10.1007/978-3-540-76900-2_29
Dennis Hofheinz, Eike Kiltz, The Group of Signed Quadratic Residues and Applications international cryptology conference. pp. 637- 653 ,(2009) , 10.1007/978-3-642-03356-8_37
Shweta Agrawal, Dan Boneh, Xavier Boyen, Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE international cryptology conference. pp. 98- 115 ,(2010) , 10.1007/978-3-642-14623-7_6
Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas, SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications Financial Cryptography and Data Security. ,vol. 6054, pp. 107- 122 ,(2010) , 10.1007/978-3-642-14992-4_11