期刊文献+

基于理想格的近似平滑投射Hash函数 被引量:3

Approximate Smooth Projective Hash Functions from Ideal Lattices
下载PDF
导出
摘要 近似平滑投射Hash(ASPH)函数是基于格(Lattice)的密码学中的一个重要组件,被Katz等用来构造抗量子攻击的口令认证密钥交换(PAKE)协议。已有的ASPH函数均是基于欧氏格上的困难性问题设计的,存在密钥长度过长、实现效率过低等问题。文章基于理想格上的错误学习(R-LWE)问题,设计了能适用于PAKE协议设计的新的公钥加密体制和ASPH函数,并对其安全性进行了证明。与已有方案相比,新体制具有密钥长度短、运算速度快、实现效率高等优点。 An approximate smooth projective hash (ASPH) function is an important primitive of the lattice-based cryptography, and it is used to construct password-based authenticated key exchange (PAKE) protocol which is resistant to quantum attacks by Katz et al. The available ASPH function based on the hardness of the standard lattice problem has a large key size and impractical implemen- tations. Based on learning with error problem from ideal lattices (R-LWE) , this paper designs a new public-key encryption scheme and an associated ASPH function that can apply to PAKE proto- col, and gives a proof of its security. Compared with the existing system, the new system has a small key size, fast computing speed and high efficiency.
出处 《信息工程大学学报》 2013年第1期13-21,共9页 Journal of Information Engineering University
基金 国家973计划资助项目(2012CB315905)
关键词 近似正确性 平滑投射Hash 理想格 R—LWE approximate correctness smooth projective Hash ideal lattices R-LWE
  • 相关文献

参考文献15

  • 1Lindner R, Peikert C. Better key sizes (and attacks) for LWE-based encryption[ C ]//CT-RSA 2011. 2011: 319-339. 被引量:1
  • 2Micciancio D, Peikert C. Trapdoors for lattices : simpler, tighter, faster, smaller[ C ]//EUROCRYPT 2012. 2012 : 700-718. 被引量:1
  • 3Boyen X. Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more [C]//PKC2010. 2010 : 499-517. 被引量:1
  • 4Lyubashevsky V. Lattice signatures without trapdoors[ C ]//Eurocrypt 2012. 2012 : 738-755. 被引量:1
  • 5Katz J, Vaikuntanathan V. Smooth projective hashing and password-based authenticated key exchange from Lattices [ C ]//Asiacrypt 2009. 2009: 636-652. 被引量:1
  • 6胡学先..标准模型下口令认证密钥交换协议的分析与设计[D].解放军信息工程大学,2010:
  • 7Gennaro R, Lindell Y. A framework for password-based authenticated key exchange[J]. ACM Transactions on Information and System Security, 2006, 9(2) : 181-234. 被引量:1
  • 8Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings [ C ]//Eurocrypt 2010. 2010: 1-23. 被引量:1
  • 9杨晓元,吴立强,张敏情,魏立线.基于理想格的适应性选择密文安全公钥加密方案[EB/OL][2012-11-01].http://d.g.wanfangdata.com.cn/conference-7568895.aspx. 被引量:1
  • 10Lyubashevsky V, Micciancio D, Peikert C, Rosen A. SWIFFT: a modest proposal for FFT hashing[C]//FSE 2008. 2005: 54 -72. 被引量:1

同被引文献16

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部