Improved lattice-based key exchange protocol algorithm

A key exchange protocol and algorithm technology, applied in key distribution

Inactive Publication Date: 2019-04-12
JIANGSU UNIV OF TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But how to design a quantum-resistant key exchange protocol has always been an important challenge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved lattice-based key exchange protocol algorithm
  • Improved lattice-based key exchange protocol algorithm
  • Improved lattice-based key exchange protocol algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In this invention, we not only point out the reasons why this Bi-ISIS-based key exchange protocol is insecure. In order to avoid the shared key attack, we propose an improved KE algorithm based on Bi-ISIS, whose security can be reduced to (M-LWE: Learning With Error problem over Modules) learning with errors.

[0021] Through the cryptographic analysis of the existing Bi-ISIS-based key exchange protocol and its simple variant protocol, it can be found that the attacker mainly uses the fact that the key vector and the noise vector are orthogonal. Therefore, to avoid such attacks, we need to apply new noise methods. That is, the secret vector and the noise vector are no longer orthogonal.

[0022] The present invention improves the existing KE scheme by introducing the general paradigm (Generation) BI-GISIS of Bi-ISIS. This improved security relies on the difficult assumption of DBi-GISIS, which is equivalent to cracking the Modulus Difficult Learning with Errors (M-DLW...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a protocol algorithm, specifically a lattice-based key exchange protocol algorithm improved through utilization of random Gaussian noises. The method comprises the steps that1, it is assumed that a constant m is greater than or equal to 2, lambda is equal to O(n), beta is equal to (square root of n)sigma, and q is equal to O(2<lambda>mn[beta]<2>, wherein the sigma is a security parameter in M-DLWE definition, it is assumed that X is equal to {z which is an element of a set R<m>:||z||<=the beta, wherein the i is the element of the set [m]}, wherein the z is the element of the set R, and the||z|| is a norm z of a coefficient vector, hereinafter, an absolute minimum residual system is employed for R<q>, namely, each coefficient a satisfies |a|<q/2,wherein the a is the element of the set R<q>; S2, an m-order random matrix A is selected, wherein the A is the element of the set R<q><m _ x _ m>, and the A is accepted by a first communication partyand a second communication party, wherein; S3, information is issued, specifically, (1), the first communication party selects x,e<1><- D<R<m,sigma>>, computes a=(Ax+e<1>)mod q, and sends the a to thesecond communication party, and (2), the second communication party selects y,e<2><- D<R<m,sigma>>, computes b<T>=(y<T>A+e<2><T>)mod q and sends the b to the first communication party; and S4, sharedkeys are generated, specifically, (1), the first communication party generates the shared key k<1>=MSB(b<T>x mod q); and (2), the second communication party generates the shared key k2=MSB(y<T>a modq).

Description

technical field [0001] The invention relates to a protocol algorithm, in particular to an improved lattice-based key exchange protocol algorithm. Background technique [0002] The Key Exchange (KE: Key Exchange) protocol is a basic cryptographic primitive that plays an important role in building secure communication protocols, for example, providing secure mobile payment, Internet of Vehicles data communication, etc. The KE protocol allows all parties to generate a shareable security key through an insecure network to achieve secure communication in an insecure channel. [0003] The definition of the KE protocol was first formally proposed by Diffie and Hellman in 1996. The security of the KE protocol designed since then is based on solving classical number theory problems. However, these schemes are not safe in the quantum era. The quantum polynomial time algorithm proposed by Shor can solve integer decomposition problems, discrete logarithm problems and discrete logarithm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0861H04L9/0869
Inventor 朱越景征骏贝绍轶葛杨沈奕陈明霞古春生
Owner JIANGSU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products