Research on Key Exchange Protocol Based on LWE

2019 
With the development of quantum computer, some cryptographic algorithms which are based on integers factorization and discrete logarithm become unsafe. Therefore it is necessary to research post-quantum cryptographic algorithms. In this paper, we mainly study post-quantum (authenticated) key exchangeprotocols. Especially, wefocusonlattice-basedprotocols where hard problem assumption can be reduced from worst-case to average-case. After research on NIST 2-round submission, key establishment schemes account for the majority and most schemes are based on lattice hard problem. LWE problem is an usual assumption. We will roughly introduce Kyber, LAC, FrodoKEM, NewHope, Threebears. How to choose a security model plays an important role for KE (or AKE) protocol. We mainly research on security, construction, efficiency, and innovation of these schemes.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []