Unlock instant, AI-driven research and patent intelligence for your innovation.

A post-quantum password-authenticated key exchange method based on error learning on modules

A key exchange and password authentication technology, applied in the field of post-quantum password authentication key exchange based on modular error learning, can solve the problem of low operating efficiency, limited theoretical implementation, program performance and security strength that do not meet practical application requirements, etc. problems, to avoid inefficiencies, and to achieve the effect of simple and efficient solutions

Active Publication Date: 2022-06-24
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, for post-quantum password-authenticated key exchange protocols, there are the following deficiencies in the prior art: First, there are few lattice-based password-authenticated key exchange protocols, and most of them are based on CRS mode The design and operation efficiency is low, so it is considered to be limited to theoretical realization and cannot be applied to real-world deployment; second, the existing schemes are not rigorous enough in parameter selection, post-quantum security analysis, and correctness analysis, resulting in schemes The performance and security strength of the solution do not meet the actual application requirements; third, the reusability and scalability of the solution are not strong, and the existing solution can only be applied to one security requirement. To achieve multiple security requirements , it is necessary to re-select and analyze parameters, resulting in poor scalability of the solution and poor reproducibility of the code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A post-quantum password-authenticated key exchange method based on error learning on modules
  • A post-quantum password-authenticated key exchange method based on error learning on modules
  • A post-quantum password-authenticated key exchange method based on error learning on modules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the objectives, technical solutions and advantages of the present invention clearer, the details of the solution will be described in detail below with reference to the accompanying drawings.

[0015] 1. Symbolic representation

[0016] In order to express and describe the protocol conveniently, the symbolic representation adopted by the protocol is firstly defined. The integer polynomial quotient ring is represented as where q is the modulus, n is the polynomial degree, is a polynomial of modulus q, X represents the variable of the polynomial; one dimension is d∈N + The ring polynomial vector of is expressed as One dimension is d×d∈N + ×N + The ring polynomial matrix of is expressed as for vector and matrix represent their transposes, respectively. If A is a deterministic algorithm, then a:=Α(b) indicates that the value of algorithm A is a when the input is b; if A is a non-deterministic algorithm, a←Α(b) indicates that the output of algo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a post-quantum password authentication key exchange method based on error learning on the model. The steps include: 1) when a client C initiates a key exchange with a server S, the client C calculates and sends the key exchange to S; 2) S is calculated using Con(σ s ) to get the negotiated key k σ and the auxiliary coordination value v, and then generate S’s identity verification information k and information k″ for verifying the client’s identity and send it to C; 3) After C generates the coordination polynomial, according to σ c , v generates its negotiation key k σ ; Then, after verifying the identity of the server, generate self-authentication information k' and session key sk c , and send k' to S; 4) S compares k' and k" to verify C, and if the verification passes, calculate the session key sk s .

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a password authentication key exchange scheme, in particular to a post-quantum password authentication key exchange method based on modular error learning. Background technique [0002] On an insecure channel, the process of negotiating a common key between two communicating parties according to a certain agreement is called key exchange. However, the key exchange protocol itself cannot identify the identities of the two communicating parties, so it cannot avoid the threat of man-in-the-middle attacks. In practice, authentication is usually combined with a key exchange scheme. There are two commonly used authentication methods: one is based on public key infrastructure (PKI) to achieve authentication; the other is based on user-friendly passwords to achieve authentication. Compared with PKI, password authentication does not require the intervention of a trusted third par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/44
CPCG06F21/602G06F21/44
Inventor 顾小卓任培欣王梓梁
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI