|
|
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ 感谢参与,应助指数 +1 zhuhf: 金币+30, ★★★★★最佳答案 2017-09-23 14:45:02 sunshan4379: LS-EPI+1, 感谢应助! 2017-09-24 16:14:10
Simple and universal construction for round-optimal password authenticated key exchange towards quantum-resistant
Accession number: 20172803925113
Authors: Zhu, Hongfeng 1 ; Geng, Shuai 1
Author affiliation : 1 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; P.C 110034, China
Source title: Journal of Information Hiding and Multimedia Signal Processing
Abbreviated source title: J. Inf. Hiding Multimedia Signal Proces.
Volume: 8
Issue: 4
Issue date: 2017
Publication Year: 2017
Pages: 798-807
Language: English
ISSN: 20734212
E-ISSN: 20734239
Document type: Journal article (JA)
Publisher: Ubiquitous International
Abstract: Since quantum computers came on the scene, the world has changed greatly, especially related to cryptography. Public key cryptosystem, particularly RSA cryptosystem cant resist the quantum computers attack, so some quantum-resistant schemes have been proposed mainly based on quantum key distribution (QKD) method or new resistance to quantum algorithms. Recently, Jonathan et al (2013) presents two password-based authenticated key exchange (PAKE) protocols which make the communication reduce to one-round. At the same time Jonathans protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathans two protocols are subjected to quantum attacks, and there are so many time-consuming arithmetics just only for achieving a smooth projective hash function in Jonathans two protocols. Based on these motivations, this paper firstly proposes a provably secure and flexible one-round PAKE scheme based on elliptic curve isogenies. Compared with Jonathans two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist quantum attacks. Finally we give the provable security of our scheme. © 2017, Ubiquitous International. All rights reserved.
Number of references: 25
Main heading: Quantum cryptography
Controlled terms: Aluminum alloys - Authentication - Cryptography - Geometry - Hash functions - Public key cryptography - Quantum computers - Quantum theory
Uncontrolled terms: Authenticated key exchange - Elliptic curve - Key exchange - Password-authenticated key exchange - Public key cryptosystems - Quantum-resistant - Smooth projective hash functions - Universal constructions
Classification code: 541.2Aluminum Alloys - 722Computer Systems and Equipment - 723Computer Software, Data Handling and Applications - 921Mathematics - 931.4Quantum Theory; Quantum Mechanics
Funding Details: Number; Acronym; Sponsor: 201602680; NSFC; National Natural Science Foundation of China
Database: Compendex
Compilation and indexing terms, © 2017 Elsevier Inc. |
|