Papers
Topics
Authors
Recent
Search
2000 character limit reached

Lightweight Public Key Encryption in Post-Quantum Computing Era

Published 24 Nov 2023 in cs.CR, cs.CC, cs.DS, and cs.ET | (2311.14845v1)

Abstract: Confidentiality in our digital world is based on the security of cryptographic algorithms. These are usually executed transparently in the background, with people often relying on them without further knowledge. In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened. This particularly affects public-key methods such as RSA and DH based on discrete logarithms and prime factorization. Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class. Thereby the approach of Cramer-Shoup is put on the new basis of elliptic curves. The system is provable cryptographically strong, especially against adaptive chosen-ciphertext attacks. In addition, the new method features small key lengths, making it suitable for Internet-of-Things. It represents an intermediate step towards an encryption scheme based on isogeny elliptic curves. This approach shows a way to a secure encryption scheme for the post-quantum computing era.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (16)
  1. Brown, D.R.L.: What hashes make rsa-oaep secure? (2007)
  2. Shannon, C.E.: A Mathematical Theory of Cryptography. Communication Theory of Secrecy Systems (1946)
  3. Pfitzmann, A.: Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems (2006)
  4. Merkle, R.C.: Secure Communications Over Insecure Channels. In: Communications of the ACM. 21. pp. 294–299 (1978)
  5. Communications Electronics Security Group: The Possibility of Secure Non-Secret Digital Encryption. Research Report No. 3006 (1970), https://www.gchq.gov.uk/sites/default/files/document_files/CESG_Research_Report_No_3006_0.pdf
  6. McEliece, R.J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory. Deep Space Network Progress Report pp. 114–116 (1978)
  7. ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory pp. 469–472 (1985)
  8. National Institute of Standards and Technology: NIST Announces First Four Quantum-Resistant Cryptographic Algorithms (2022), https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms
  9. The European Union Agency for Cybersecurity (ENISA): Post-Quantum Cryptography - Integration study (2022), https://www.enisa.europa.eu/publications/post-quantum-cryptography-integration-study/@@download/fullReport
  10. National Institute of Standards and Technology: NIST Issues First Call for Lightweight Cryptography to Protect Small Electronics (2018), https://www.nist.gov/news-events/news/2018/04/nist-issues-first-call-lightweight-cryptography-protect-small-electronics
  11. Seet, M.Z.: Elliptic Curve Cryptography: Improving the Pollard-Rho Algorithm. Ph.D. thesis (2007)
  12. Chen, R.: Cramer-Shoup Encryption. University of Wollongong (2014)
  13. Peter Wiliston Shor: Algorithms for quantum computation: Discrete logarithms and factoring. Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press pp. 124–134 (1994)
  14. National Institute of Standards and Technology: Recommendation forKey Managem. NIST Special Publication 8 (2020)
  15. Velu, J.: Isogenies entre courbes elliptiques. Comptesrendus de la Academie des Sciences (1971)
  16. Tani, S.: Claw finding algorithms using quantum walk. Theoretical Computer Science (2009)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.