A computationally efficient and randomized RLWE-based key exchange scheme

被引:1
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal, India
关键词
Computational efficiency; Post-quantum security; Key exchange; Ring learning with errors (RLWE); AVERAGE-CASE REDUCTIONS;
D O I
10.1007/s10586-023-04032-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key exchange enables two or more entities to agree on an identical key. In post-quantum, the construction of ring learning with error (RLWE) based key exchange provides a strong provable secure, and efficient solution. The resistance against signal leakage and key mismatch attacks is essential for developing secure RLWE-based key exchange mechanisms for the quantum era. RLWE-based key exchange schemes are developed in recent years, however, most of them found vulnerable to attacks or have higher computational costs. We have analyzed the existing contributions and defined a mechanism to achieve a computationally efficient and secure solution. To improve security and reduce computing overhead, we are introducing a new key exchange technique to attain efficiency and security against signal leakage and key mismatch attacks. Our scheme is proven secure by the random oracle model (ROM). Moreover, we have provided a performance evaluation of computation cost competing with other existing key exchange techniques.
引用
下载
收藏
页码:1599 / 1610
页数:12
相关论文
共 50 条
  • [1] A computationally efficient and randomized RLWE-based key exchange scheme
    Komal Pursharthi
    Dheerendra Mishra
    Cluster Computing, 2024, 27 : 1599 - 1610
  • [2] Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
    Gao, Xinwei
    Ding, Jintai
    Li, Lin
    Liu, Jiqiang
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) : 1584 - 1593
  • [3] Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange
    Gong, Boru
    Zhao, Yunlei
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 163 - 183
  • [4] Non-interactive zero-knowledge proof scheme from RLWE-based key exchange
    Xie, Shaofen
    Yao, Wang
    Wu, Faguo
    Zheng, Zhiming
    PLOS ONE, 2021, 16 (08):
  • [5] COMPARISON ANALYSIS OF DING'S RLWE-BASED KEY EXCHANGE PROTOCOL AND NEWHOPE VARIANTS
    Gao, Xinwei
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (02) : 221 - 233
  • [6] A Lightweight and Efficient Encryption/Decryption Coprocessor for RLWE-Based Cryptography
    Yang, Yushu
    Wang, Zihang
    Wang, Jianfei
    Hou, Jia
    Su, Yang
    Yang, Chen
    IEEE Transactions on Circuits and Systems II: Express Briefs, 2024, 71 (12) : 5004 - 5008
  • [7] An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    Xu, Yuqing
    IEEE Transactions on Services Computing, 2024, 17 (05): : 2012 - 2026
  • [8] An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
    Christian Mouchet
    Elliott Bertrand
    Jean-Pierre Hubaux
    Journal of Cryptology, 2023, 36
  • [9] An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
    Mouchet, Christian
    Bertrand, Elliott
    Hubaux, Jean-Pierre
    JOURNAL OF CRYPTOLOGY, 2023, 36 (02)
  • [10] Fast Arithmetic Hardware Library For RLWE-Based Homomorphic Encryption
    Agrawal, Rashmi
    Bu, Lake
    Kinsy, Michel A.
    28TH IEEE INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM), 2020, : 206 - 206