Post-Quantum Primitives in Information Security

被引:0
|
作者
Aleksandrova, E. B. [1 ]
Shtyrkina, A. A. [1 ]
Iarmak, A. V. [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ SPbPU, Inst Appl Math & Mech, 29 Polytech Skaya Str, St Petersburg 195251, Russia
来源
关键词
post-quantum cryptography; cryptographic access control; elliptic curve; isogeny;
D O I
暂无
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Public-key cryptosystems based on integer factorization and discrete logarithm problems can be broken with rapidly developing quantum computing technologies. With appearance of large-scale quantum computer, these problems can be solved in polynomial time using Shor's algorithm. The paper provides an overview of existing cryptographic protocols based on quantum-resistant problems. One of such hard problems involves isogeny computations between supersingular elliptic curves. A cryptographic access control scheme based on such hard problem is proposed. Analysis of the proposed protocol security and practical implementation limitations are given.
引用
收藏
页码:269 / 276
页数:8
相关论文
共 50 条
  • [21] Post-quantum Security using Channel Noise
    Sharifian, Setareh
    Safavi-Naini, Reihaneh
    Lin, Fuchun
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2288 - 2290
  • [22] Post-quantum Security of Fiat-Shamir
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 65 - 95
  • [23] Open-Source FPGA Implementation of Post-Quantum Cryptographic Hardware Primitives
    Agrawal, Rashmi
    Bu, Lake
    Ehret, Alan
    Kinsy, Michel
    2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, : 211 - 217
  • [24] Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
    Buser, Maxime
    Dowsley, Rafael
    Esgin, Muhammed F.
    Kermanshahi, Shabnam Kasra
    Kuchta, Veronika
    Liu, Joseph K.
    Phan, Raphael C. -W.
    Zhang, Zhenfei
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 25 - 45
  • [25] Redeeming Reset Indifferentiability and Applications to Post-quantum Security
    Zhandry, Mark
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 518 - 548
  • [26] Towards Post-quantum Security for IoT Endpoints with NTRU
    Guillen, Oscar M.
    Poeppelmann, Thomas
    Mera, Jose M. Bermudo
    Bongenaar, Elena Fuentes
    Sigl, Georg
    Sepulveda, Johanna
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 698 - 703
  • [27] Post-quantum security on the Lai-Massey scheme
    Zhang, Zhongya
    Wu, Wenling
    Sui, Han
    Wang, Bolin
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (08) : 2687 - 2704
  • [28] Post-quantum Techniques in Wireless Network Security: An Overview
    Fakhruldeen, Hassan Falah
    Al-Kaabi, Rana Abbas
    Jabbar, Feryal Ibrahim
    Al-Kharsan, Ibrahim H.
    Shoja, Sarah Jawad
    MALAYSIAN JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES, 2023, 19 (03): : 337 - 344
  • [29] Post-Quantum Hybrid Security Mechanism for MIMO Systems
    Qassim, Yousef
    Magana, Mario Edgardo
    Yavuz, Attila
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 684 - 689
  • [30] Logic Programming with Post-Quantum Cryptographic Primitives for Smart Contract on Quantum-Secured Blockchain
    Sun, Xin
    Kulicki, Piotr
    Sopek, Mirek
    ENTROPY, 2021, 23 (09)