Cryptanalysis of a lattice based key exchange protocol

被引:0
|
作者
Shaowu MAO [1 ,2 ]
Pei ZHANG [1 ]
Houzhen WANG [1 ]
Huanguo ZHANG [1 ]
Wanqing WU [1 ,3 ]
机构
[1] Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
[2] Huawei Technoligies Co., Ltd.
[3] School of Computer Science and Technology, Hebei University
基金
中国国家自然科学基金;
关键词
ISIS; Bi; Cryptanalysis of a lattice based key exchange protocol;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
A lattice is a set of points in n-dimensional space with a periodic structure.Lattice-based cryptosystem holds a great promise for post-quantum cryptography[1],as they enjoy very strong security proofs based on the worst-case hardness,relatively efficient implementations,as well as great simplicity.The first lattice-based cryptosystem was proposed by Ajtai and Dwork[2],whose security is based on the lattice problems in the worstcase.After their seminal work,several latticebased cryptosystems have been proposed till now,
引用
收藏
页码:196 / 198
页数:3
相关论文
共 50 条
  • [41] Length based attack and braid groups: Cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol
    Myasnikov, Alex D.
    Ushakov, Alexander
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 76 - +
  • [42] Cryptanalysis and Enhancement of Modified Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3837 - 3839
  • [43] Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
    Lu, Siqi
    Zhao, Jinhua
    Cheng, Qingfeng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 567 - 578
  • [44] Cryptanalysis of a generic one-round key exchange protocol with strong security
    Yang, Zheng
    Lai, Junyu
    Li, Guoyuan
    IET INFORMATION SECURITY, 2018, 12 (01) : 71 - 78
  • [45] Key exchange protocol based on the private key
    Yi, Tong
    Shi, Minyong
    Shang, Wenqian
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 29 - 34
  • [46] Cryptanalysis and improvement on an ID-based key issuing protocol
    Wang, Licheng
    Cao, Zhenfu
    Cao, Feng
    Qian, Haifeng
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 8 - +
  • [47] Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Jeon, Woongryul
    Lee, Byunghee
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 309 - +
  • [48] Cryptanalysis of a Group Key Establishment Protocol
    Martinez Carracedo, Jorge
    Suarez Corona, Adriana
    SYMMETRY-BASEL, 2021, 13 (02): : 1 - 10
  • [49] Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange
    Jiang X.
    Huang H.
    Pan G.
    Journal of Cyber Security and Mobility, 2023, 12 (02): : 205 - 220
  • [50] Cryptanalysis of an authentication and key distribution protocol
    Tamkang Univ, Taipei, Taiwan
    Commun Lett, 1 (7-8):