MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU

被引:1
作者
Akleylek, Sedat [1 ]
Cevik, Nursah [1 ]
机构
[1] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkey
关键词
CCA-CPA security; cryptography; key exchange; MaTRU-KE; NTRU-based cryptosystems;
D O I
10.1002/dac.4326
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum attack-resistant cryptosystems are required for secure communication since there is a big demand to have quantum computers. Lattice-based cryptography is one of the quantum-secure families due to its key/ciphertext sizes and performance. NTRU-based cryptosystems, a member of lattice-based cryptosystems, have received much more attention. MaTRU, a noncommutative version of NTRU with some matrix properties, is used to obtain a key exchange protocol in 2018. In this paper, we focus on MaTRU-based key exchange protocols having CCA2 properties. We propose CCA2-secure versions of MaTRU-KE and then provide a security analysis of CCA2-secure key establishment protocols. We also provide a comparison with the previous ones.
引用
收藏
页数:14
相关论文
共 25 条
[11]  
DWORKIN M, 2015, NIST FEDERAL INFORM
[12]  
Fujisaki E., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P537
[13]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[14]  
Gupta D. S., 2016, PERSPECT SCI, V8, P228, DOI DOI 10.1016/J.PISC.2016.04.034
[15]  
GUPTA DS, 2017, NOVEL EFFICIENT LATT, V31, pE3473
[16]  
Hankerson D., 2003, Guide to Elliptic Curve Cryptography
[17]  
Hoffstein J., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P267, DOI 10.1007/BFb0054868
[18]  
Hoffstein J, 2001, LECT NOTES COMPUT SC, V2045, P211
[19]  
Nielsen MA., 2011, Quantum computation and quantum information, V10
[20]  
NIST, 2017, Post-Quantum Cryptography Standardization