A computationally efficient and randomized RLWE-based key exchange scheme

被引:1
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal, India
关键词
Computational efficiency; Post-quantum security; Key exchange; Ring learning with errors (RLWE); AVERAGE-CASE REDUCTIONS;
D O I
10.1007/s10586-023-04032-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key exchange enables two or more entities to agree on an identical key. In post-quantum, the construction of ring learning with error (RLWE) based key exchange provides a strong provable secure, and efficient solution. The resistance against signal leakage and key mismatch attacks is essential for developing secure RLWE-based key exchange mechanisms for the quantum era. RLWE-based key exchange schemes are developed in recent years, however, most of them found vulnerable to attacks or have higher computational costs. We have analyzed the existing contributions and defined a mechanism to achieve a computationally efficient and secure solution. To improve security and reduce computing overhead, we are introducing a new key exchange technique to attain efficiency and security against signal leakage and key mismatch attacks. Our scheme is proven secure by the random oracle model (ROM). Moreover, we have provided a performance evaluation of computation cost competing with other existing key exchange techniques.
引用
收藏
页码:1599 / 1610
页数:12
相关论文
共 50 条
  • [21] RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
    Lijun Qi
    Jincheng Zhuang
    The Journal of Supercomputing, 2024, 80 : 2767 - 2798
  • [22] APAS: Application-Specific Accelerators for RLWE-Based Homomorphic Linear Transformations
    Bian, Song
    Kundi, Dur E. Shahwar
    Hirozawa, Kazuma
    Liu, Weiqiang
    Sato, Takashi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4663 - 4678
  • [24] Improved Multiplication Triple Generation over Rings via RLWE-Based AHE
    Rathee, Deevashwer
    Schneider, Thomas
    Shukla, K. K.
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 347 - 359
  • [25] RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
    Qi, Lijun
    Zhuang, Jincheng
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (02): : 2767 - 2798
  • [26] A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network
    Guo, Junyan
    Du, Ye
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [27] A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles
    Xu, Zisang
    Li, Xiong
    Xu, Jianbo
    Liang, Wei
    Choo, Kim-Kwang Raymond
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [28] Leakage of Signal function with reused keys in RLWE key exchange
    Ding, Jintai
    Alsayigh, Saed
    Saraswathy, R., V
    Fluhrer, Scott
    Lin, Xiaodong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [29] A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication
    Adhikary, Supriya
    Karmakar, Angshuman
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (01) : 344 - 356
  • [30] A computationally efficient key-hiding based group re-keying scheme for secure multicasting
    Asem, Y.M.
    Kara, A.
    International Journal of Computers and Applications, 2006, 28 (01) : 65 - 72