Secure Digital Archiving in Post-Quantum Era

被引:0
作者
Clupek, Vlastimil [1 ]
Malina, Lukas [1 ]
Zeman, Vaclav [1 ]
机构
[1] Brno Univ Technol, Dept Telecommun, CS-61090 Brno, Czech Republic
来源
2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP) | 2015年
关键词
Digital Signature; Post-Quantum Cryptography; Secure Digital Archiving; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article introduces a solution of secure digital archiving in the post-quantum era. The basic tool at secure digital archiving of the electronic documents is the signature schemes, which are used at creation of the certificates and the timestamps. This article deals with the question of security of the signature schemes in the post-quantum era and introduces the post-quantum signature schemes, which will be resistant to the attacks leading by both conventional and quantum computers. The conventional signature schemes, based on factorization or discrete logarithm problem, in case of implementing the Shor algorithm on a quantum computer will be easy to break through. The main point of this article is the proposal of the solution of secure digital archiving with using the secure post-quantum signature schemes.
引用
收藏
页码:622 / 626
页数:5
相关论文
共 15 条
  • [1] Ajtai M., 1998, P 30 ANN ACM S THEOR, P10, DOI DOI 10.1145/276698.276705
  • [2] Strengths and weaknesses of quantum computing
    Bennett, CH
    Bernstein, E
    Brassard, G
    Vazirani, U
    [J]. SIAM JOURNAL ON COMPUTING, 1997, 26 (05) : 1510 - 1523
  • [3] Bernstein DJ., 2009, POSTQUANTUM CRYPTOGR, P1, DOI [DOI 10.1007/978-3-540-88702-7, 10.1007/978-3-540-88702-7, DOI 10.1007/978-3-540-88702-71, 10.1007/978-3-540-88702-7_1, DOI 10.1007/978-3-540-88702-7_1]
  • [4] Dubois V, 2007, LECT NOTES COMPUT SC, V4622, P1
  • [5] Gentry C, 2008, ACM S THEORY COMPUT, P197
  • [6] Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112
  • [7] Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866
  • [8] Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122
  • [9] Lavoie B. F., 2004, Microform & Imaging Review, V33, P68, DOI 10.1515/MFIR.2004.68
  • [10] Lyubashevsky V, 2008, LECT NOTES COMPUT SC, V4948, P37, DOI 10.1007/978-3-540-78524-8_3