Abstract | ||
---|---|---|
We investigate the post-quantum security of the encrypted key exchange(EKE) protocols based on some basic physical parameters of ion-trap quantum computer, and show that the EKE protocol with a 40-bit password will be secure against a quantum adversary with several ion-trap quantum computers. We present a password encrypted no-key protocol to resist middle-man attack, and prove that it is also with the post-quantum security. The analysis presented here is probably of general meaning for the security evaluation of various hybrid cryptosystems. |
Year | Venue | Field |
---|---|---|
2013 | CoRR | Cryptographic protocol,Computer security,Oakley protocol,Computer science,Internet Security Association and Key Management Protocol,Security association,Bitmessage,Key-agreement protocol,Protected Extensible Authentication Protocol,Encrypted key exchange |
DocType | Volume | Citations |
Journal | abs/1305.5640 | 0 |
PageRank | References | Authors |
0.34 | 3 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Li Yang | 1 | 38 | 15.40 |
Rui-Rui Zhou | 2 | 1 | 0.69 |