期刊文献+

基于Polar码改进的McEliece密码体制 被引量:1

An Improved McEliece Cryptosystem Based on Polar Code
下载PDF
导出
摘要 随着量子计算机对计算能力的提高,RSA和椭圆曲线密码等经典密码方案在量子计算机时代已经不再安全,基于编码的密码方案具有抵抗量子计算的优势,在未来具有良好的应用前景。文章研究极化码的极化性质,改进密钥存储方法,提出了基于Polar码改进的McEliece密码体制。改进后的编码加密方案不再存储整个矩阵,而是存储冻结比特对应的矩阵,其密钥大小比原始密码方案减少约63.36%。采用连续消除(SC)译码算法,译码复杂度较低,并通过实验证明了提出的密码方案达到140bit的安全级别,可以抵抗目前已知存在的各种攻击。最后,文章进一步阐述了基于Polar码的密码方案未来的发展方向,拓宽了极化码在编码密码方案中的应用。 With the improvement of computing power of quantum computers,classical cryptography schemes such as RSA and elliptic curve cryptography are no longer secure in the era of quantum computers.The code-based cryptography has the advantage of resisting quantum computing and has a good application prospect in future.This paper studies the polarization properties of Polar codes,improves the key storage method,and proposes McEliece system based on Polar codes.The improved encoding encryption scheme no longer stores the whole matrix,but stores the matrix corresponding to frozen bits.The key size is about 63.36%smaller than that of the original cryptographic scheme.The SC decoding algorithm adopted in this paper has a low decoding complexity,and it is proved that the proposed cryptography scheme reaches the security level of 140 bits and can resist various attacks that are known to exist at present.Finally,the future development direction of Polar code-based cryptography scheme is further elaborated,and the application of Polar code in coding cryptography scheme is broadened.
作者 韩益亮 李喆 李鱼 HAN Yiliang;LI Zhe;LI Yu(College of Password Engineering,Engineering University of PAP,Xi'an 710086,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第1期1-8,共8页 Netinfo Security
基金 国家自然科学基金[61572521]。
关键词 编码 Polar码 McEliece密码体制 SC译码算法 coding Polar codes McEliece cryptosystem SC decoding algorithm
  • 相关文献

参考文献1

二级参考文献19

  • 1龙桂鲁,李岩松,肖丽,屠长存,孙扬.Grover量子搜索算法及改进[J].原子核物理评论,2004,21(2):114-116. 被引量:18
  • 2KOBLITZ N. Elliptic Curve CryptosystemsJJ]. Mathematics of Computing American Mathematical Society, 1987(48): 203-309. 被引量:1
  • 3MILLER V S. Use of Elliptic Curves in Cryptography[C]// International Association for Cryptologic Research (IACR). Advances in Cryptology-CRYPTO' 85, August 18-22, 1985, Santa Barbara, California, USA. Berlin: Springer, 1986: 417-426. 被引量:1
  • 4QUISQUATER J j, SAMYDE D. Electromagnetic Analysis (EMA): Measures and Counter Measures for Smart Cards[C]//The Java Card Forum, Eurosmart and INRIA. Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, September 19-21, 2001, Cannes, France. Berlin: Springer, 2001: 200- 91B. 被引量:1
  • 5PADE D. Theoretical Use of Cache Memory as a Cryptanalytic Side- channel[R]. Bristol: Department of Computer Science, University of Bristol, Technical Report CSTR-02-003, 2002. 被引量:1
  • 6YANG Bo, WU Kaijie, KARRI R. Scan-based Side-Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard[C]//IEEE. International Test Conference, October 26-28, 2004, Charlotte, NC, USA. New Jersey: IEEE, 2004: 339-344. 被引量:1
  • 7NARA R, TOGAWA N, YANAGJSAWA M, et al. Scan-based Attack for an AES-LSI Included with Other IPs[J]. Ieice Technical Report Dependable Computing, 2008, 108(298): 49-53. 被引量:1
  • 8ARA R, TOGAWA N, YANAGISAWA M, et al. Scan-Based Attack Against Elliptic Curve Cryptosystems[C]//IEEE. The 2010 15th Asia and South Pacific Design Automation Conference, January 18-21, 2010, Taipei. New Jersey: IEEE, 2010: 407-412. 被引量:1
  • 9DEUTSCH D. Quantum Theory: the Church-Turing Principle and Universal Quantum Computer[J]. Proceedings of the Royal Society A Mathematical Physical & Engineering Sciences, 1985, 400(1818): 97- 117. 被引量:1
  • 10GROVER L K. A Fast Quantum Mechanics Algorithm for Database Search[C]//Association for Computing Machinery (ACM). The 28th ACM Symposium on Theory of Computation. 1996, Philadelphia, PA, USA. New York: ACM Press. 1996: 212-219. 被引量:1

共引文献13

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部