QCB: Efficient Quantum-Secure Authenticated Encryption

被引:8
|
作者
Bhaumik, Ritam [1 ]
Bonnetain, Xavier [2 ,3 ]
Chailloux, Andre [1 ]
Leurent, Gaetan [1 ]
Naya-Plasencia, Maria [1 ]
Schrottenloher, Andre [4 ]
Seurin, Yannick [5 ]
机构
[1] INRIA, Paris, France
[2] Univ Waterloo, Inst Quantum Comp, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Univ Lorraine, INRIA, CNRS, Nancy, France
[4] CWI, Cryptol Grp, Amsterdam, Netherlands
[5] ANSSI, Paris, France
基金
欧洲研究理事会;
关键词
Authenticated encryption; Lightweight cryptography; QCB; Post-quantum cryptography; Provable security; Tweakable block ciphers;
D O I
10.1007/978-3-030-92062-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It was long thought that symmetric cryptography was only mildly affected by quantum attacks, and that doubling the key length was sufficient to restore security. However, recent works have shown that Simon's quantum period finding algorithm breaks a large number of MAC and authenticated encryption algorithms when the adversary can query the MAC/encryption oracle with a quantum superposition of messages. In particular, the OCB authenticated encryption mode is broken in this setting, and no quantum-secure mode is known with the same efficiency (rate-one and parallelizable). In this paper we generalize the previous attacks, show that a large class of OCB-like schemes is unsafe against superposition queries, and discuss the quantum security notions for authenticated encryption modes. We propose a new rate-one parallelizable mode named QCB inspired by TAE and OCB and prove its security against quantum superposition queries.
引用
收藏
页码:668 / 698
页数:31
相关论文
共 50 条
  • [31] A blockchain-based quantum-secure reporting protocol
    Saeed Banaeian Far
    Maryam Rajabzadeh Asaar
    Peer-to-Peer Networking and Applications, 2021, 14 : 2992 - 3011
  • [32] Fundamental limits of quantum-secure covert optical sensing
    Bash, Boulat A.
    Gagatsos, Christos N.
    Datta, Animesh
    Guha, Saikat
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017,
  • [33] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [34] An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things
    Banerjee, Utsav
    Pathak, Abhishek
    Chandrakasan, Anantha P.
    2019 IEEE INTERNATIONAL SOLID-STATE CIRCUITS CONFERENCE (ISSCC), 2019, 62 : 46 - +
  • [35] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [36] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910
  • [37] Adaptively secure broadcast encryption with authenticated content distributors
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Multimedia Tools and Applications, 2020, 79 : 7889 - 7910
  • [38] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [39] An Authenticated Encryption Mechanism for Secure Group Communication in Grid
    Li, Yunfa
    Jin, Hai
    Zou, Deqing
    Liu, Sanmin
    Han, Zongfen
    ICICSE: 2008 INTERNATIONAL CONFERENCE ON INTERNET COMPUTING IN SCIENCE AND ENGINEERING, PROCEEDINGS, 2008, : 298 - +
  • [40] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54