Title
Research on Key Exchange Protocol Based on LWE
Abstract
With the development of quantum computer, some cryptographic algorithms which are based on integers factorization and discrete logarithm become unsafe. Therefore it is necessary to research post-quantum cryptographic algorithms. In this paper, we mainly study post-quantum (authenticated) key exchangeprotocols. Especially, wefocusonlattice-basedprotocols where hard problem assumption can be reduced from worst-case to average-case. After research on NIST 2-round submission, key establishment schemes account for the majority and most schemes are based on lattice hard problem. LWE problem is an usual assumption. We will roughly introduce Kyber, LAC, FrodoKEM, NewHope, Threebears. How to choose a security model plays an important role for KE (or AKE) protocol. We mainly research on security, construction, efficiency, and innovation of these schemes.
Year
DOI
Venue
2019
10.1109/CIS.2019.00057
2019 15th International Conference on Computational Intelligence and Security (CIS)
Keywords
DocType
ISBN
lattice,LWE,security model,key-encapsulation mechanism (KEM),(authenticated) key exchange,signature
Conference
978-1-7281-6093-1
Citations 
PageRank 
References 
0
0.34
19
Authors
6
Name
Order
Citations
PageRank
Hang-chao Ding100.34
Han Jiang21412.05
Jie Cai302.03
Chen-guang Wang400.34
Jing Zou500.34
Qiuliang Xu615742.71