MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU

被引:1
作者
Akleylek, Sedat [1 ]
Cevik, Nursah [1 ]
机构
[1] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkey
关键词
CCA-CPA security; cryptography; key exchange; MaTRU-KE; NTRU-based cryptosystems;
D O I
10.1002/dac.4326
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum attack-resistant cryptosystems are required for secure communication since there is a big demand to have quantum computers. Lattice-based cryptography is one of the quantum-secure families due to its key/ciphertext sizes and performance. NTRU-based cryptosystems, a member of lattice-based cryptosystems, have received much more attention. MaTRU, a noncommutative version of NTRU with some matrix properties, is used to obtain a key exchange protocol in 2018. In this paper, we focus on MaTRU-based key exchange protocols having CCA2 properties. We propose CCA2-secure versions of MaTRU-KE and then provide a security analysis of CCA2-secure key establishment protocols. We also provide a comparison with the previous ones.
引用
收藏
页数:14
相关论文
共 25 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
[Anonymous], POSTQ CRYPT PROJ
[3]  
[Anonymous], 2013, IACR Cryptol ePrint Arch
[4]  
Arslan B, 2018, 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P22
[5]  
Bernstein D. J., 2009, Postquantum cryptography, DOI [DOI 10.1007/978-3-540-88702-71, DOI 10.1007/978-3-540-88702-7]
[6]  
Coglianese M, 2005, LECT NOTES COMPUT SC, V3797, P232
[7]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[8]  
Dent AW, 2003, LECT NOTES COMPUT SC, V2898, P133
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
DING J, 2019, KEY EXCHANGE BASED S