【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 6051次   下载 5825 本文二维码信息
码上扫一扫!
后量子可证明安全研究
江浩东,刘亚敏
分享到: 微信 更多
(数学工程与先进计算国家重点实验室 郑州 中国 450001;中国科学院软件研究所可信计算与信息保障实验室 北京 中国 100190;中国科学院信息工程研究所信息安全国家重点实验室 北京 中国 100093)
摘要:
后量子密码经过数十年的发展,其效率已经趋于实用化,其标准化工作也正在开展中。与此同时,对量子环境中的密码方案的可证明安全理论的研究在近十年也备受关注。本文将介绍近年来后量子可证明安全领域的发展和研究现状,包括经典密码方案在量子环境中的安全模型建立、安全概念定义,以及经典环境和量子环境中的安全性的分离结论和蕴含结论,并重点介绍量子随机谕言模型中的安全性证明。对后量子可证明安全理论的研究,对于合理评估密码算法在量子环境中的安全性、实现到后量子密码算法的安全平稳过渡具有重要意义。
关键词:  后量子密码学  可证明安全  量子随机谕言模型
DOI:10.19363/J.cnki.cn10-1380/tn.2019.03.02
投稿时间:2018-11-08修订日期:2019-02-18
基金项目:国家自然科学基金面上项目"公钥密码的后量子可证安全理论研究"(No.61772515),以及国家自然科学基金青年项目"可证明安全的确定性公钥加密体制研究"(No.61502480)资助。
On Post-Quantum Provable Security
JIANG Haodong,LIU Yamin
State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China;Trusted Computing and Information Assurance Laboratory, Chinese Academy of Sciences, Beijing 100190, China;State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Abstract:
Post-quantum cryptosystems are becoming more and more practical in efficiency after decades of development,and the standardization of them is also in progress.In the meantime,the research on the provable security theory of cryptosystems in the quantum setting attracts much attention in the past decade.In this paper we give a survey on the development and state-of-art of the field of post-quantum provable security,including the establishing of security models and the defining of security notions for classical cryptosystems in the quantum setting,and the separation and the implication results of security in the classical setting and the quantum settings.Especially,security proofs in the quantum random oracle model are introduced.The research on the post-quantum provable security theory,is of significance for appropriately evaluating the security of cryptographic algorithms in the quantum setting and realizing a safe and smooth transition to post-quantum cryptographic algorithms.
Key words:  post-quantum cryptography  provable security  quantum random oracle model