New Authenticated Key Exchange Scheme Based on Ring Learning with Errors Problem

作者: Zhang Cheng-li , Yang Xiao-peng , Ma Wen-ping

DOI:

关键词:

摘要: Using the hard assumption of Ring-Decision Learning With Errors (Ring-DLWE) in lattice, a new Authenticated Key Exchange (AKE) scheme is proposed, which based on Peikert's reconciliation technique. Under standard model, proposed provably secure CK additionally achieves weak Perfect Forward Secrecy (wPFS). Compared with current (KE) schemes LWE, not only protects shared session key balanced derivation function but also resists quantum attacks because lattice problem.

参考文章(11)
Vadim Lyubashevsky, Chris Peikert, Oded Regev, A Toolkit for Ring-LWE Cryptography theory and application of cryptographic techniques. ,vol. 7881, pp. 35- 54 ,(2013) , 10.1007/978-3-642-38348-9_3
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama, Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism computer and communications security. pp. 83- 94 ,(2013) , 10.1145/2484313.2484323
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions Proceedings of the fourtieth annual ACM symposium on Theory of computing - STOC 08. pp. 197- 206 ,(2008) , 10.1145/1374376.1374407
Vadim Lyubashevsky, Chris Peikert, Oded Regev, On ideal lattices and learning with errors over rings theory and application of cryptographic techniques. pp. 1- 23 ,(2010) , 10.1007/978-3-642-13190-5_1
Benny Applebaum, David Cash, Chris Peikert, Amit Sahai, Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems international cryptology conference. pp. 595- 618 ,(2009) , 10.1007/978-3-642-03356-8_35
Chris Peikert, An efficient and parallel Gaussian sampler for lattices international cryptology conference. ,vol. 2010, pp. 80- 97 ,(2010) , 10.1007/978-3-642-14623-7_5
Ran Canetti, Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels Lecture Notes in Computer Science. pp. 453- 474 ,(2001) , 10.1007/3-540-44987-6_28
Xue-Xian Hu, Jiang-hong Wei, Mao Ye, Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol: Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol Journal of Electronics Information & Technology. ,vol. 35, pp. 2278- 2282 ,(2014) , 10.3724/SP.J.1146.2012.01380