首页> 外文会议>International Conference on Selected Areas in Cryptography >Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances
【24h】

Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances

机译:使用多个协议实例的uttonum静态静态密钥协议

获取原文
获取外文期刊封面目录资料

摘要

Some key agreement protocols leak information about secret keys if dishonest participants use specialized public keys. We formalize these protocols and attacks, and present a generic transformation that can be made to such key agreement protocols to resist such attacks. Simply put, each party generates k different keys, and two parties perform key agreement using all k~2 combinations of their individual keys. We consider this transformation in the context of various post-quantum key agreement schemes and analyze the attacker's success probabilities (which depend on the details of the underlying key agreement protocol) to determine the necessary parameter sizes for 128-bit security. Our transformation increases key sizes by a factor of k and computation times by k~2, which represents a significant cost - but nevertheless still feasible. Our transformation is particularly well-suited to supersingular isogeny Diffie-Hellman, in which one can take k = 113 instead of the usual k = 256 at the 128-bit quantum security level. These results represent a potential path forward towards solving the open problem of securing long-term static-static key exchange against quantum adversaries.
机译:如果不诚实的参与者使用专门的公钥,某些关键协议协议泄漏有关秘密密钥的信息。我们正规化这些协议和攻击,并呈现了可以对这种关键协议协议进行抵制此类攻击的通用转换。简单地说,每个方都会生成K不同的键,两方使用各个键的所有K〜2组合执行关键协议。我们考虑在各种后uTALUM密钥协议计划的上下文中的这种转变,并分析攻击者的成功概率(这取决于基础关键协议协议的详细信息)来确定128位安全性的必要参数大小。我们的转变将k〜2增加了k和计算时间的键大小,这代表了显着的成本 - 但仍然仍然可行。我们的转化特别适合于超晶体源性差异Hellman,其中可以在128位量子安全水平处取得k = 113而不是通常的k = 256。这些结果代表了解决对量子对手的长期静态静态关键交换的开放问题的潜在路径。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号