期刊文献+

基于Polar码改进的抗量子密码方案 被引量:1

An Improved Post-quantum Cryptography Based on Polar Codes
下载PDF
导出
摘要 为了促进抗量子密码方案的实用化,在Mostafa Esmaeili方案的基础上,利用Polar码的极化性质改进抗量子密码方案,把信息比特作为原方案中的明文,把冻结比特作为原方案中的随机比特串。改进后的方案没有改变原方案的结构,可以抵御目前已知的信息集译码攻击,达到了IND-CPA(indistinguishability chosen ciphertext attacks)安全。选择合理的参数,使得改进方案的整体密钥尺寸比McEliece的整体密钥尺寸减少了70%,提高了方案的实用性,为即将来临的5G时代提供了一种新型抗量子密码方案。 To make post-quantum cryptography practical,based on the Mostafa Esmaeili cryptosystem,a post-quantum cryptography using the polarization properties of Polar code was improved,and the information bit was taken as the plaintext in the original scheme and the frozen bit as the random bit string in the original scheme.The proposed cryptosystem does not change the structure of the original scheme,can resist the known information set decoding attacks,and the cryptosystem has indistinguishability against chosen plaintext attacks.The overall key size of the improved scheme was reduce by 70%by selecting reasonable parameters and the practicability of the scheme was improved.Result provides a new post-quantum cryptography for the coming 5G era.
作者 李喆 韩益亮 李鱼 LI Zhe;HAN Yi-liang;LI Yu(College of Cryptographic Engineering,Engineering University of PAP,Xi an 710086,China)
出处 《科学技术与工程》 北大核心 2020年第13期5198-5204,共7页 Science Technology and Engineering
基金 国家自然科学基金(61572521) 武警工程大学科研创新团队科学基金(KYTD201805)。
关键词 抗量子密码 Mostafa Esmaeili方案 Polar码 信息译码攻击 McEliece post-quantum cryptography Mostafa Esmaeili cryptosystem Polar code information set decoding attack McEliece
  • 相关文献

参考文献3

二级参考文献25

  • 1梅挺,代群.基于Niederreiter纠错码的公钥密码体制的研究[J].通信技术,2007,40(6):36-39. 被引量:3
  • 2李元兴,王新梅.关于Niederreiter代数码公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36. 被引量:11
  • 3龙桂鲁,李岩松,肖丽,屠长存,孙扬.Grover量子搜索算法及改进[J].原子核物理评论,2004,21(2):114-116. 被引量:18
  • 4KOBLITZ N. Elliptic Curve CryptosystemsJJ]. Mathematics of Computing American Mathematical Society, 1987(48): 203-309. 被引量:1
  • 5MILLER V S. Use of Elliptic Curves in Cryptography[C]// International Association for Cryptologic Research (IACR). Advances in Cryptology-CRYPTO' 85, August 18-22, 1985, Santa Barbara, California, USA. Berlin: Springer, 1986: 417-426. 被引量:1
  • 6QUISQUATER J j, SAMYDE D. Electromagnetic Analysis (EMA): Measures and Counter Measures for Smart Cards[C]//The Java Card Forum, Eurosmart and INRIA. Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, September 19-21, 2001, Cannes, France. Berlin: Springer, 2001: 200- 91B. 被引量:1
  • 7PADE D. Theoretical Use of Cache Memory as a Cryptanalytic Side- channel[R]. Bristol: Department of Computer Science, University of Bristol, Technical Report CSTR-02-003, 2002. 被引量:1
  • 8YANG Bo, WU Kaijie, KARRI R. Scan-based Side-Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard[C]//IEEE. International Test Conference, October 26-28, 2004, Charlotte, NC, USA. New Jersey: IEEE, 2004: 339-344. 被引量:1
  • 9NARA R, TOGAWA N, YANAGJSAWA M, et al. Scan-based Attack for an AES-LSI Included with Other IPs[J]. Ieice Technical Report Dependable Computing, 2008, 108(298): 49-53. 被引量:1
  • 10ARA R, TOGAWA N, YANAGISAWA M, et al. Scan-Based Attack Against Elliptic Curve Cryptosystems[C]//IEEE. The 2010 15th Asia and South Pacific Design Automation Conference, January 18-21, 2010, Taipei. New Jersey: IEEE, 2010: 407-412. 被引量:1

共引文献17

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部