Font Size: a A A

Identity-based Authenticated Key Exchange Protocol From Lattices

Posted on:2022-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuangFull Text:PDF
GTID:2518306536480584Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Authenticated Key Exchange(AKE)protocol,one of the most important means to ensure the security of network communications,allows participants to confirm each other's identities and negotiates a shared session key in an insecure channel.With the development of quantum computing technology,AKE protocols based on the traditional number theory problems(discrete logarithm problems,large integer decomposition problems,etc.)no longer meet people's security needs,so more and more quantum-resistant AKE protocols have been proposed.Lattice-based AKE protocols are favored by researchers because of their high computation efficiency and strong security.Due to the lack of post-quantum public key infrastructure,lots of lattice-based AKE combines public key cryptography systems with unauthenticated key exchange protocol.The thesis proposes an Identity-Based AKE(ID-AKE)protocol.The contributions of this work are as follows:(1)A detailed analysis of the existing lattice-based AKE protocols is carried out and the feasibility of lattice-based ID-AKE protocol is pointed out.The formal definition,security goals and security model of ID-AKE are presented respectively.(2)An RLWE-based ID-AKE protocol is proposed and then proved to be correct.An IBE scheme is integrated into an unauthenticated key exchange protocol,temporary public key feature extraction and recovery methods are adopted to reduce the data and improve the performance during encrypted transmission.The security of this protocol is reduced to solving the decision RLWE problem,the protocol in this thesis is more efficient compared to other ID-AKE protocols on lattices.(3)An RLWR-based ID-AKE protocol is proposed and then proved to be correct.In order to improve performance,the RLWR problem is utilized to get rid of the complicated and time-consuming Gaussian noise sampling process.The security of this protocol is reduced to solving the decision RLWR problem.
Keywords/Search Tags:Lattices, Key Exchange, Identity-Based Encryption, RLWE, RLWR
PDF Full Text Request
Related items