logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 2: 028101(2017) https://doi.org/10.1007/s11432-015-0721-4

Cryptanalysis of a lattice based key exchange protocol

More info
  • ReceivedSep 8, 2016
  • AcceptedOct 24, 2016
  • PublishedDec 29, 2016

Abstract


Funded by

National Natural Science Foundation of China(61202386)

Foundation of Science and Technology on Information Assurance Laboratory(KJ-14-002)

National Basic Research Program of China(2014CB340600)

State Key Program of National Natural Science of China(U1135004)

National Natural Science Foundation of China(61202385)

National Natural Science Foundation of China(61303212)

Open Project of Beijing Key Lab of Trusted Computing(BJUT)

State Key Program of National Natural Science of China(61332019)

National Natural Science Foundation of China(61303024)

National Natural Science Foundation of China(61170080)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61303212, 61202385, 61202386, 61303024, 61170080), State Key Program of National Natural Science of China (Grant Nos. 61332019, U1135004), National Basic Research Program of China (Grant No. 2014CB340600), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-002), and Open Project of Beijing Key Lab of Trusted Computing (BJUT).


References

[1] Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace security. Sci China Inf Sci, 2015, 58: 110101 Google Scholar

[2] Ajtai M, Dwork C. A public-key cryptosystem with worst-case/average-case equivalence. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York: ACM, 1997. 284--293. Google Scholar

[3] Arbitman Y, Dogon G, Lyubashevsky V, et al. SWIFFTX: a proposal for the SHA-3 standard. 2008. Google Scholar

[4] Ducas L, Durmus A, Lepoint T, et al. Lattice signatures and bimodal gaussians. In: Advances in Cryptology---CRYPTO 2013. Berlin: Springer, 2013. 40--56. Google Scholar

[5] Lindner R, Peikert C. Better key sizes (and attacks) for LWE-based encryption. In: Proceedings of the 11th International Conference on Topics in Cryptology: CT-RSA, San Francisco, 2011. 319--339. Google Scholar

[6] Ducas L, Lyubashevsky V, Prest T. Efficient identity-based encryption over NTRU lattices. In: Advances in Cryptology---ASIACRYPT 2014. Berlin: Springer, 2014. 22--41. Google Scholar

[7] Micciancio D, Regev O. Worst-case to average-case reductions based on Gaussian measures. SIAM J Comput, 2007, 37: 267-302 CrossRef Google Scholar

[8] Wang S B, Zhu Y, Ma D, et al. Lattice-based key exchange on small integer solution problem. Sci China Inf Sci, 2014, 57: 112111-302 Google Scholar

[9] Gupta D S, et al. 's lattice-based key exchange protocol. Perspect Sci, 2016, 8: 228-230 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1