Protocolo para el intercambio de claves criptográficas basado en el problema “learning with rounding”

Autores/as

  • David Ricardo Ledo Baster Departamento de Informática, Universidad de Holguín, Holguín
  • Manuel Mariño Betancourt Universidad de Holguín
  • Miguel Cruz Ramírez Universidad de Holguín

Palabras clave:

protocolos de intercambio de claves, criptografía asimétrica, criptografía postcuántica

Resumen

La mayoría de los protocolos de intercambio de claves utilizados con mayor frecuencia se basan en la suposición de que los problemas del logaritmo discreto y la factorización de ciertos números son problemas difı ́ciles de resolver. Sin embargo, dicha suposición no se cumple si utilizamos computadoras cuánticas. En este trabajo se propone un protocolo para el intercambio de claves criptográficas basado en el problema Learning with Rounding (LWR), el cual es inmune a la computación cuántica.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

Hayo Baan, Sauvik Bhattacharya, Oscar GarciaMorchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, and Zhenfei Zhang. Round2: Kem and pke based on glwr. Cryptology ePrint Archive, Report 2017, 2017. http://eprint.iacr.org/2017.

Abhishek Banerjee, Chris Peikert, and Alon Rosen. Pseudorandom functions and lattices. Cryptology ePrint Archive, Report 2011/401, 2011. http://eprint. iacr.org/2011/401.

Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, and Ludo Tolhuizen. spkex: An optimized lattice-based key-exchange. Cryptology ePrint Archive, Report 2017, 2017. http://eprint.iacr.org/ 2017.

Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, and Alon Rosen. On the hardness of learning with rounding over small modulus. Cryptology ePrint Archive, Report 2015, 2015. http://eprint.iacr. org/2015.

Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. Frodo: Take off the ring! practical, quantum-secure key exchange from lwe. Cryptology ePrint Archive, Report 2016/659, 2016. http: //eprint.iacr.org/2016/659.

Joppe W. Bos, Craig Costello, Michael Naehrig, and Douglas Stebila. Post-quantum key exchange for the tls protocol from the ring learning with errors problem. Cryptology ePrint Archive, Report 2014/599, 2014. http://eprint.iacr.org/.

Long Chen, Zhenfeng Zhang, and Zhenfei Zhang. On the hardness of the computational ring-lwr problem and its applications. Cryptology ePrint Archive, Report 2018, 2018. http://eprint.iacr.org/2018.

Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, and Yongha Son. A practical post-quantum public-key cryptosystem based on splwe. Cryptology ePrint Archive, Report 2016/1055, 2016. http:// eprint.iacr.org/2016/1055.

Jung Hee Cheon, Duhyeong Kim, Joohee Lee, and Yongsoo Song. Lizard: Cut off the tail! practical postquantum public-key encryption from lwe and lwr. Cryptology ePrint Archive, Report 2016/1126, 2016. http: //eprint.iacr.org/2016/1126.

Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, and Frederik Vercauteren. Saber: Module-lwr based key exchange, cpa-secure encryption and cca-secure kem. Cryptology ePrint Archive, Report 2018, 2018. http://eprint.iacr.org/2018.

Jintai Ding, Xiang Xie, and Xiaodong Lin. A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive, Report 2012/688, 2012. http://eprint.iacr.org/ 2012/688.

Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, and Kazuki Yoneyama. Strongly secure authenticated key exchange from factoring, codes, and lattices. Cryptology ePrint Archive, Report 2012/211, 2012. http: //eprint.iacr.org/.

Daniele Micciancio. On the hardness of learning with errors with binary secrets. Cryptology ePrint Archive, Report 2018, 2018. http://eprint.iacr.org/ 2018.

National Institute of Standards and Technology. Proposed submission requirements and evaluation criteria for thepost-quantum cryptography standardization process, 2016. http://csrc.nist.gov/groups/ ST/post-quantum-crypto/documents/ call-for-proposals-draft-aug-2016. pdf.

National Institute of Standards and Technology. Proposed submission for the postquantum cryptography standardization process, 2017. https://csrc.nist.gov/ projects/post-quantum-cryptography/ round-1-submissions.

Chris Peikert. Lattice cryptography for the internet. Cryptology ePrint Archive, Report 2014/070, 2014. http://eprint.iacr.org/.

Oded Regev. On lattices, learning with errors, random linear codes, and cryptography. In ACM, editor, Thirtyseventh Annual ACM Symposium on Theory of Computing, pages 84–93, 2005.

Peter W. Shor. Polynominal time algorithms for discrete logarithms and factoring on a quantum computer. In Lecture Notes in Computer Science, volume 877, page 289. Springer, 1994.

Song Y. Yan. Quantum Attacks on Public-Key Cryptosystems. Springer, 2013.

Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, and özgür Dagdelen. Authenticated key exchange from ideal lattices. Cryptology ePrint Archive, Report 2014/589, 2014. http://eprint.iacr.org/.

Descargas

Publicado

2024-03-26 — Actualizado el 2019-06-27

Versiones

Cómo citar

[1]
Ledo Baster, D.R. et al. 2019. Protocolo para el intercambio de claves criptográficas basado en el problema “learning with rounding”. Ciencias matemáticas. 33, 1 (jun. 2019), 1–7.

Número

Sección

Artículo Original