Post-quantum commutative encryption algorithm

被引:0
|
作者
Moldovyan, A. A. [1 ]
Moldovyan, D. N. [1 ]
Moldovyan, N. A. [1 ]
机构
[1] Russian Acad Sci, St Petersburg Inst Informat & Automat, 14 Liniya,39, St Petersburg 199178, Russia
关键词
commutative encryption; post-quantum cryptoscheme; no-key protocol; finite non-commutative algebra; associative algebra; homomorphism;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To provide possibility to design the commutative encryption algorithms on the basis of new versions of the hidden discrete logarithm problem, the term "commutativity" is interpreted in the extended sense. Namely, the encryption algorithm is called commutative, if the double encryption on two different keys produces the ciphertext that can be correctly decrypted using the keys in arbitrary order. The introduced commutative encryption method is characterized in using the single-use random subkeys. This feature defines probabilistic nature of the encryption process. A candidate for post-quantum commutative encryption algorithm is proposed, using the computations in the 6-dimensional finite non-commutative associative algebra with a large set of the right-sided global units. The proposed algorithm is used as the base of the post-quantum no-key protocol.
引用
收藏
页码:299 / 317
页数:19
相关论文
共 50 条
  • [1] Post-quantum Commutative Encryption Algorithm
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Han Ngoc Phieu
    Minh Hieu Nguyen
    [J]. CONTEXT-AWARE SYSTEMS AND APPLICATIONS, AND NATURE OF COMPUTATION AND COMMUNICATION, 2019, 298 : 205 - 214
  • [2] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [3] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [4] POST-QUANTUM HYBRID ENCRYPTION SCHEME FOR BLOCKCHAIN APPLICATION
    Hendy, Kevin
    Wicaksana, Arya
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2022, 18 (06): : 1701 - 1717
  • [5] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13277 LNCS : 402 - 432
  • [6] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [7] Revisiting Anonymity in Post-quantum Public Key Encryption
    Cheng, Yao
    Lu, Xianhui
    Li, Ziyi
    Li, Bao
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 336 - 370
  • [8] MEPs call for 'urgent action' on post-quantum encryption
    Boerkamp, Martijn
    [J]. PHYSICS WORLD, 2024, 37 (05)
  • [9] Post-Quantum Security of IGE Mode Encryption in Telegram
    Lee, Jeeun
    Kim, Sungsook
    Lee, Seunghyun
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 148 - 151
  • [10] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432