学位论文详细信息
Post-Quantum Security of Authenticated Key Establishment Protocols
Cryptography;Key Establishment;Elliptic Curve Cryptography;Post-Quantum Cryptography
LeGrow, Jason
University of Waterloo
关键词: Cryptography;    Key Establishment;    Elliptic Curve Cryptography;    Post-Quantum Cryptography;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/10386/3/LeGrow_Jason.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】

We present a security model for authenticated key establishment that allows for quantum interactions between the adversary and quantum oracles that emulate classical parties, resulting in a truly post-quantum security definition. We then give a generic construction for a secure protocol in the quantum random oracle model by combining a signature scheme which is existentially unforgeable under adaptive quantum chosen message attack in the quantum random oracle model (EUF-qCMA-QRO secure) with an unauthenticated key establishment protocol which is secure against a passive adversary. This construction allows us to give an explicit example of a secure protocol whose security is based on a variant of the Diffie-Hellman problem for isogenies of supersingular elliptic curves; in particular, generic security-strengthening transformations allow us to take a signature scheme which is EUF-CMA-RO secure against a quantum adversary and transform it into an EUF-qCMA-QRO signature scheme, which we combine with a standard secure unauthenticated key establishment protocol to achieve the desired result.

【 预 览 】
附件列表
Files Size Format View
Post-Quantum Security of Authenticated Key Establishment Protocols 630KB PDF download
  文献评价指标  
  下载次数:14次 浏览次数:27次