Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism

被引:2
|
作者
Seyhan, Kuebra [1 ]
Akleylek, Sedat [1 ,2 ,3 ]
机构
[1] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ Samsun, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
[3] Univ Tartu, Chair Secur & Theoret Comp Sci, Tartu, Estonia
关键词
Post-quantum cryptography; Key encapsulation mechanism; NTRU; Lattice-based cryptography;
D O I
10.7717/peerj-cs.1391
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent's KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism.
引用
收藏
页数:19
相关论文
共 27 条