首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信保密与通信安全论文--理论论文

格基密码协议的构造与分析

摘要第5-7页
ABSTRACT第7-9页
List of Symbols第12-13页
List of Abbreviations第13-18页
CHAPTER 1 Introduction第18-30页
    1.1 Post-Quantum Cryptography第18-20页
    1.2 Lattice-Based Cryptography第20-24页
        1.2.1 Advantages and Disadvantages第20-21页
        1.2.2 Research Status第21-24页
    1.3 Our Motivations第24-26页
        1.3.1 Motivation for Lattice-Based KEM第24页
        1.3.2 Motivation for Lattice-Based Two-Party AKE第24-26页
        1.3.3 Motivation for Lattice-Based Group Authenticated Key Transfer Pro-tocol第26页
    1.4 Main Contributions第26-28页
        1.4.1 Construction of Lattice-Based KEM第26-27页
        1.4.2 Construction of Lattice-Based Two-Party AKEs第27页
        1.4.3 Construction of Lattice-Based Group Authenticated Key TransferProtocol第27-28页
    1.5 Organization第28-30页
CHAPTER 2 Preliminaries第30-54页
    2.1 Abbreviations and Notations第30-31页
    2.2 Lattices Theory第31-33页
        2.2.1 q-ary Integer Lattices第31-32页
        2.2.2 Dual Lattice第32-33页
    2.3 Computational Problems第33-34页
    2.4 Hard Assumptions for q-ary Integer Lattice第34-35页
    2.5 Cyclotomic Number Field and Its Codifferent第35-39页
        2.5.1 Cyclotomic Number Field第35-36页
        2.5.2 Canonical Embedding第36-37页
        2.5.3 Codifferent第37-39页
    2.6 Continuous and Discrete RLWE Distribution第39-40页
    2.7 Gaussian Distribution and Subgaussian Random Variables第40-43页
        2.7.1 Gaussian Distribution and Gaussian Random Variables第40-41页
        2.7.2 Hermite Normal Form of Learning with Errors第41-42页
        2.7.3 Discrete Gaussian Sampling Algorithm over Cyclotomic Field第42-43页
    2.8 Reconciliation Mechanism第43-46页
        2.8.1 Reconciliation Mechanism under Even Modulus q第44-45页
        2.8.2 Reconciliation Mechanism under Odd Modulus q第45-46页
    2.9 Trapdoors and Preimage Sampleable Functions第46-48页
        2.9.1 Serial Gaussian Sampling Algorithm第46-47页
        2.9.2 Preimage Sampleable Functions第47页
        2.9.3 Parallel Gaussian Sampling Algorithm第47页
        2.9.4 Rejecting Sampling Algorithm第47-48页
    2.10 Ideal Lattices第48-49页
    2.11 Bonsai Tree Techniques第49-50页
    2.12 Random Oracle Model and Standard Model第50-51页
    2.13 Robust Extractor第51页
    2.14 Secure Sketch第51页
    2.15 Conclusion第51-54页
CHAPTER 3 CCA Secure Key Encapsulation Mechanism over Ideal Lattices第54-70页
    3.1 Introduction第54-57页
        3.1.1 Related Work第55-56页
        3.1.2 Main Idea第56-57页
    3.2 Security Model for Key Encapsulation Mechanism第57-58页
    3.3 Universal One Way Hash Function第58页
    3.4 Pairwise Independent Hash Function第58页
    3.5 Message Authentication Code第58页
    3.6 CCA Secure KEM Scheme in Standard Model第58-64页
        3.6.1 Scheme Description第59-60页
        3.6.2 Correctness第60-61页
        3.6.3 Security Analysis第61-64页
    3.7 Performance Analysis第64-65页
    3.8 Comparison第65-68页
    3.9 Conclusion第68-70页
CHAPTER 4 Two-party Authenticated Key Exchange Protocols under Learning withErrors Problem第70-98页
    4.1 Introduction第70-75页
        4.1.1 Related Work第71-72页
        4.1.2 Main Idea第72页
        4.1.3 Results and Approaches第72-74页
        4.1.4 Technological Means第74-75页
    4.2 Security Model for Two-Party Authenticated Key Exchange第75-77页
    4.3 Two-Party AKE Protocol under RLWE第77-90页
        4.3.1 Protocol Description第77-78页
        4.3.2 Correctness第78-80页
        4.3.3 Security Analysis第80-90页
    4.4 Performance Analysis第90-91页
    4.5 Comparison第91-93页
    4.6 One-pass Variant Protocol第93-94页
    4.7 Two-pass Variant Protocol第94-97页
        4.7.1 Protocol Description第94-95页
        4.7.2 Correctness第95-97页
    4.8 Conclusion第97-98页
CHAPTER 5 Group Authenticated Key Transfer Protocol under Learning with Er-rors Problem第98-122页
    5.1 Introduction第98-101页
        5.1.1 Related Work第99-100页
        5.1.2 Main Idea第100-101页
    5.2 Security Model for Group Authenticated Key Transfer Protocol第101-103页
    5.3 Basic Secret Sharing Scheme第103-109页
        5.3.1 Scheme Description第103-104页
        5.3.2 Design for Secure Sketch第104页
        5.3.3 Correctness第104-105页
        5.3.4 Security Analysis第105-109页
    5.4 Extension第109-111页
        5.4.1 Scheme Description第109-110页
        5.4.2 Correctness第110页
        5.4.3 Security Analysis第110-111页
    5.5 Group Authenticated Key Transfer Protocol under LWE第111-119页
        5.5.1 Protocol Description第111-112页
        5.5.2 Security Analysis第112-118页
        5.5.3 Performance Analysis第118-119页
    5.6 Comparison第119-121页
    5.7 Conclusion第121-122页
CHAPTER 6 Conclusion and Future Work第122-124页
    6.1 Conclusion第122页
    6.2 Future Work第122-124页
REFERENCES第124-138页
ACKNOWLEDAGEMENTS第138-140页
RESUME第140-142页

论文共142页,点击 下载论文
上一篇:不等错误保护Spinal码的设计与研究
下一篇:无线蜂窝网络的高效节能资源管控技术研究