Network coding-based post-quantum cryptography

被引:14
作者
Cohen A. [1 ,2 ]
D’Oliveira R.G.L. [1 ,2 ]
Salamatian S. [2 ,3 ]
Médard M. [1 ,2 ]
机构
[1] The Research Laboratory of Electronics, MIT, Cambridge, 02139, MA
[2] MIT, Cambridge, 02139, MA
[3] D.E. Shaw Group, New York, 10036, NY
来源
IEEE Journal on Selected Areas in Information Theory | 2021年 / 2卷 / 01期
关键词
Communication system security; Cryptography; Encryption; Information-theoretic security; Post quantum cryptography; Public key; Secure distributed storage; Secure network coding;
D O I
10.1109/JSAIT.2021.3054598
中图分类号
学科分类号
摘要
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theoretic security with public-key cryptography. In addition, the scheme is general and can be applied to any communication network, and to any public-key cryptosystem. Our hybrid scheme is based on the information theoretic notion of individual secrecy, which traditionally relies on the assumption that an eavesdropper can only observe a subset of the communication links between the trusted parties – an assumption that is often challenging to enforce. For this setting, several code constructions have been developed, where the messages are linearly mixed before transmission over each of the paths in a way that guarantees that an adversary which observes only a subset has sufficient uncertainty about each individual message. Instead, in this article, we take a computational viewpoint, and construct a coding scheme in which an arbitrary secure cryptosystem is utilized on a subset of the links, while a pre-processing similar to the one in individual security is utilized. Under this scheme, we demonstrate 1) a computational security guarantee for an adversary which observes the entirety of the links 2) an information theoretic security guarantee for an adversary which observes a subset of the links, and 3) information rates which approach the capacity of the network and greatly improve upon the current solutions. A perhaps surprising consequence of our scheme is that, to guarantee a computational security level b, it is sufficient to encrypt a single link using a computational post-quantum scheme. That is, using HUNCC, we can ensure post-quantum security in networks where it is not possible to use public-key encryption over all the links in the network. In addition, the information rate approaches 1 as the number of communication links increases. As a concrete example, in a multipath network with three links, using a 128-bit computationally secure McEliece cryptosystem only over one link, we obtain a 128-bit individually computationally secure level over all paths with a total information rate of 0.91 in the network. © 2021 IEEE.
引用
收藏
页码:49 / 64
页数:15
相关论文
共 96 条
  • [1] Shannon C.E., Communication theory of secrecy systems, Bell Syst. Techn. J., 28, 4, pp. 656-715, (1949)
  • [2] Kaltz J., Lindell Y., Introduction to Modern Cryptography: Principles and Protocols, (2008)
  • [3] McEliece R.J., A public-key cryptosystem based on algebraic coding theory, Coding Thv, 4244, pp. 114-116, (1978)
  • [4] Bernstein D.J., Lange T., Peters C., Attacking and defending the mcEliece cryptosystem, Proc. Int. Workshop Post-Quantum Cryptogr., pp. 31-46, (2008)
  • [5] El Rouayheb S.Y., Soljanin E., On wiretap networks II, Proc. IEEE Int. Symp. Inf. Theory (ISIT), pp. 551-555, (2007)
  • [6] Cohen A., Cohen A., Medard M., Gurewitz O., Secure multisource multicast, IEEE Trans. Commun., 67, 1, pp. 708-723, (2019)
  • [7] Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 2, pp. 120-126, (1978)
  • [8] Shor P.W., Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Annu. Symp. Found. Comput. Sci., pp. 124-134, (1994)
  • [9] Hallgren S., Fast quantum algorithms for computing the unit group and class group of a number field, Proc. 37th Annu. ACM Symp. Theory Comput., pp. 468-474, (2005)
  • [10] Hallgren S., Polynomial-time quantum algorithms for Pell’s equation and the principal ideal problem, J. ACM, 54, 1, pp. 1-19, (2007)