Lattice-based key exchange on small integer solution problem

被引:25
|
作者
Wang ShanBiao [1 ]
Zhu Yan [2 ]
Ma Di [3 ]
Feng RongQuan [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[3] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
基金
中国国家自然科学基金;
关键词
cryptography; lattices; small integer solutions; key exchange protocol; secure communications; FULLY HOMOMORPHIC ENCRYPTION; EFFICIENT; SECURE; SEQUENCES; FRAMEWORK; TRAPDOORS; ZERO;
D O I
10.1007/s11432-014-5147-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new hard problem, called bilateral inhomogeneous small integer solution (Bi-ISIS), which can be seen as an extension of the small integer solution problem on lattices. The main idea is that, instead of choosing a rectangle matrix, we choose a square matrix with small rank to generate Bi-ISIS problem without affecting the hardness of the underlying SIS problem. Based on this new problem, we present two new hardness problems: computational Bi-ISIS and decisional problems. As a direct application of these problems, we construct a new lattice-based key exchange (KE) protocol, which is analogous to the classic Diffie-Hellman KE protocol. We prove the security of this protocol and show that it provides better security in case of worst-case hardness of lattice problems, relatively efficient implementations, and great simplicity.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Lattice-based key exchange on small integer solution problem
    WANG ShanBiao
    ZHU Yan
    MA Di
    FENG RongQuan
    [J]. Science China(Information Sciences), 2014, 57 (11) : 150 - 161
  • [2] Lattice-based key exchange on small integer solution problem
    ShanBiao Wang
    Yan Zhu
    Di Ma
    RongQuan Feng
    [J]. Science China Information Sciences, 2014, 57 : 1 - 12
  • [3] Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
    Jing, Zhengjun
    Gu, Chunsheng
    Yu, Zhimin
    Shi, Peizhong
    Gao, Chongzhi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1717 - 1727
  • [4] Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement
    Zhengjun Jing
    Chunsheng Gu
    Zhimin Yu
    Peizhong Shi
    Chongzhi Gao
    [J]. Cluster Computing, 2019, 22 : 1717 - 1727
  • [5] A strongly secure lattice-based key exchange protocol
    Wen, Weiqiang
    Wang, Libin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2258 - 2269
  • [6] A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange
    Aikata, Aikata
    Mert, Ahmet Can
    Jacquemin, David
    Das, Amitabh
    Matthews, Donald
    Ghosh, Santosh
    Roy, Sujoy Sinha
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1568 - 1580
  • [7] Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature
    Xue, Guanhao
    Wang, Baocang
    Qu, Quanbo
    Zhang, Weidong
    [J]. IET INFORMATION SECURITY, 2021, 15 (01) : 107 - 116
  • [8] Efficient KEA-Style Lattice-Based Authenticated Key Exchange
    Wang, Zilong
    Hu, Honggang
    [J]. FRONTIERS IN CYBER SECURITY, 2018, 879 : 96 - 109
  • [9] A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
    Seyhan, Kubra
    Akleylek, Sedat
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10
  • [10] Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols
    Aldeylek, Sedat
    Seyhan, Kubra
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 91 - 96