Lattice-based key exchange on small integer solution problem

被引:25
|
作者
Wang ShanBiao [1 ]
Zhu Yan [2 ]
Ma Di [3 ]
Feng RongQuan [1 ]
机构
[1] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[3] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
基金
中国国家自然科学基金;
关键词
cryptography; lattices; small integer solutions; key exchange protocol; secure communications; FULLY HOMOMORPHIC ENCRYPTION; EFFICIENT; SECURE; SEQUENCES; FRAMEWORK; TRAPDOORS; ZERO;
D O I
10.1007/s11432-014-5147-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new hard problem, called bilateral inhomogeneous small integer solution (Bi-ISIS), which can be seen as an extension of the small integer solution problem on lattices. The main idea is that, instead of choosing a rectangle matrix, we choose a square matrix with small rank to generate Bi-ISIS problem without affecting the hardness of the underlying SIS problem. Based on this new problem, we present two new hardness problems: computational Bi-ISIS and decisional problems. As a direct application of these problems, we construct a new lattice-based key exchange (KE) protocol, which is analogous to the classic Diffie-Hellman KE protocol. We prove the security of this protocol and show that it provides better security in case of worst-case hardness of lattice problems, relatively efficient implementations, and great simplicity.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [41] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [42] Lattice-based sums
    El-Zekey, Moataz
    Medina, Jesus
    Mesiar, Radko
    [J]. INFORMATION SCIENCES, 2013, 223 : 270 - 284
  • [43] Lattice-based certificateless public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    [J]. International Journal of Information Security, 2014, 13 : 315 - 333
  • [44] A Lattice-Based Public Key Encryption with Equality Test in Standard Model
    Dung Hoang Duong
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Roy, Partha Sarathi
    Susilo, Willy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 138 - 155
  • [45] Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
    Behnia, Rouzbeh
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1269 - 1282
  • [46] Lattice-based signcryption
    Li, Fagen
    Bin Muhaya, Fahad T.
    Khan, Muhammad Khurram
    Takagi, Tsuyoshi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (14): : 2112 - 2122
  • [47] D-IRA Codes Over Integer Rings for Lattice-Based Multiple Access
    Zhang, Tianbo
    Yu, Fangtao
    Yang, Tao
    Liu, Rongke
    [J]. IEEE Communications Letters, 2024, 28 (12) : 2719 - 2723
  • [48] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [49] Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
    Dai, Wei
    Doroz, Yarkin
    Polyakov, Yuriy
    Rohloff, Kurt
    Sajjadpour, Hadi
    Savas, Erkay
    Sunar, Berk
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1169 - 1184
  • [50] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)