Network Coding-Based Post-Quantum Cryptography

被引:17
作者
Cohen, Alejandro [1 ]
D'Oliveira, Rafael G. L. [1 ]
Salamatian, Salman [2 ,3 ]
Medard, Muriel [1 ]
机构
[1] MIT, Elect Res Lab, Cambridge, MA 02139 USA
[2] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[3] DE Shaw Grp, New York, NY 10036 USA
来源
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY | 2021年 / 2卷 / 01期
关键词
Post quantum cryptography; cryptography; information-theoretic security; secure network coding; public key; encryption; communication system security; secure distributed storage; DISTRIBUTED STORAGE; MCELIECE; SECURITY; CAPACITY; CODES;
D O I
10.1109/JSAIT.2021.3054598
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theoretic security with public-key cryptography. In addition, the scheme is general and can be applied to any communication network, and to any public-key cryptosystem. Our hybrid scheme is based on the information theoretic notion of individual secrecy, which traditionally relies on the assumption that an eavesdropper can only observe a subset of the communication links between the trusted parties - an assumption that is often challenging to enforce. For this setting, several code constructions have been developed, where the messages are linearly mixed before transmission over each of the paths in a way that guarantees that an adversary which observes only a subset has sufficient uncertainty about each individual message. Instead, in this article, we take a computational viewpoint, and construct a coding scheme in which an arbitrary secure cryptosystem is utilized on a subset of the links, while a pre-processing similar to the one in individual security is utilized. Under this scheme, we demonstrate 1) a computational security guarantee for an adversary which observes the entirety of the links 2) an information theoretic security guarantee for an adversary which observes a subset of the links, and 3) information rates which approach the capacity of the network and greatly improve upon the current solutions. A perhaps surprising consequence of our scheme is that, to guarantee a computational security level b, it is sufficient to encrypt a single link using a computational post-quantum scheme. That is, using HUNCC, we can ensure post-quantum security in networks where it is not possible to use public-key encryption over all the links in the network. In addition, the information rate approaches 1 as the number of communication links increases. As a concrete example, in a multipath network with three links, using a 128-bit computationally secure McEliece cryptosystem only over one link, we obtain a 128-bit individually computationally secure level over all paths with a total information rate of 0.91 in the network.
引用
收藏
页码:49 / 64
页数:16
相关论文
共 95 条
[1]  
Agrawal M, 2012, International journal on computer science and engineering, V4, P877
[2]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[3]  
[Anonymous], 2008, Introduction to Modern Cryptography
[4]  
[Anonymous], 2020, SNOB-5G Scalable Network Backhauling for 5G
[5]  
[Anonymous], 2018, White Paper
[6]  
[Anonymous], 2013, Physical layer security in wireless communications
[7]  
Augot D., 2015, Rep. ICT-645622
[8]   Data Infrastructure at LinkedIn [J].
Auradkar, Aditya ;
Botev, Chavdar ;
Das, Shirshanka ;
DeMaagd, Dave ;
Feinberg, Alex ;
Ganti, Phanindra ;
Gao, Lei ;
Ghosh, Bhaskar ;
Gopalakrishna, Kishore ;
Harris, Brendan ;
Koshy, Joel ;
Krawez, Kevin ;
Kreps, Jay ;
Lu, Shi ;
Nagaraj, Sunil ;
Narkhede, Neha ;
Pachev, Sasha ;
Perisic, Igor ;
Qiao, Lin ;
Quiggle, Tom ;
Rao, Jun ;
Schulman, Bob ;
Sebastian, Abraham ;
Seeliger, Oliver ;
Silberstein, Adam ;
Shkolnik, Boris ;
Soman, Chinmay ;
Sumbaly, Roshan ;
Surlaker, Kapil ;
Topiwala, Sajid ;
Tran, Cuong ;
Varadarajan, Balaji ;
Westerman, Jemiah ;
White, Zach ;
Zhang, David ;
Zhang, Jason .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1370-1381
[9]   Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes [J].
Baldi, Marco ;
Chiaraluce, Franco .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :2591-2595
[10]   LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures [J].
Baldi, Marco .
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 :160-174