A key exchange scheme based on lattice

被引:2
|
作者
Li, Wulu [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
关键词
component; key exchange; lattice; SIS; LWE; provable security; PROTOCOLS; SECURE;
D O I
10.1109/DASC.2013.45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We construct a key exchange scheme with session key security and Alice's privacy, assuming the hardness of "small integer solution" (SIS) problem and "learning with errors" (LWE) problem, which have worst-case to average-case reductions from lattice problems. Our key exchange scheme is the first lattice-based key exchange scheme with provable security. Moreover, our scheme can be modified to be secure under impersonation attack by adding an authentication step; also, it can be modified to be more efficient using a new variant of LWE.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 50 条
  • [1] A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
    Seyhan, Kubra
    Akleylek, Sedat
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [2] Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT
    Tan, Zuowen
    Jiao, Jintao
    Chen, Yanliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (08):
  • [3] Cryptanalysis of a lattice based key exchange protocol
    Shaowu MAO
    Pei ZHANG
    Houzhen WANG
    Huanguo ZHANG
    Wanqing WU
    ScienceChina(InformationSciences), 2017, 60 (02) : 196 - 198
  • [4] Cryptanalysis of a lattice based key exchange protocol
    Mao, Shaowu
    Zhang, Pei
    Wang, Houzhen
    Zhang, Huanguo
    Wu, Wanqing
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (02)
  • [5] A new key exchange scheme based on Chebyshev polynomials
    Wang Dahu
    Yang Haizhu
    Yu Fashan
    Wang Xudong
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 124 - 127
  • [6] A jigsaw puzzle based secret key exchange scheme
    Farn, En-Jung
    Chen, Chaur-Chin
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3067 - +
  • [7] Cryptanalysis of a key exchange scheme based on block matrices
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Taborda Duarte, Pedro
    Villar, Jorge L.
    INFORMATION SCIENCES, 2014, 276 : 319 - 331
  • [8] Security of ID-based key exchange scheme
    Scott, M
    ELECTRONICS LETTERS, 1998, 34 (07) : 653 - 654
  • [9] Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid
    Shekhawat, Hema
    Gupta, Daya Sagar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (07):
  • [10] Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature
    Xue, Guanhao
    Wang, Baocang
    Qu, Quanbo
    Zhang, Weidong
    IET INFORMATION SECURITY, 2021, 15 (01) : 107 - 116