Network Coding-Based Post-Quantum Cryptography

نویسندگان

چکیده

We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The scheme we offer is in the sense that it combines information-theoretic security with public-key cryptography. In addition, general and can be applied any network, cryptosystem. Our based on information theoretic notion of individual secrecy, which traditionally relies assumption an eavesdropper only observe subset links between trusted parties - often challenging enforce. For this setting, several code constructions have been developed, where messages are linearly mixed before transmission over each paths way guarantees adversary observes has sufficient uncertainty about message. Instead, article, take computational viewpoint, construct coding arbitrary utilized links, while pre-processing similar one utilized. Under scheme, demonstrate 1) guarantee for entirety 2) 3) rates approach capacity network greatly improve upon current solutions. A perhaps surprising consequence our that, level b, encrypt single link using scheme. That is, HUNCC, ensure networks not possible use encryption all network. rate approaches 1 as number increases. As concrete example, multipath three 128-bit computationally McEliece link, individually total 0.91

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Post-quantum Cryptography: Code-Based Signatures

This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.

متن کامل

Quantum and Post Quantum Cryptography

Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermined the security assumptions upon which currently used public key cryptographic algorithms are ba...

متن کامل

“ Post - Quantum Cryptography ”

1 Summary of the review In this review I present the book " Post-Quantum Cryptography ". This volume gives a detailed, technical-level treatment of the post-quantum cryptography universe. 2 Summary of the book When (if?) quantum computers of a big enough size will be available, most of the current public-key cryptography primitives based on number theory will be vulnerable. The " next generatio...

متن کامل

Cryptography from Post-Quantum Assumptions

In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a new notion of weakly Random-Self-Reducible public-key cryptosystem and show how it can be used to implement secure Oblivious Transfer. We also show that two recent (Post-quantum) cryptosystems can be considered as weakly RandomSelf-Reducible. We introduce a new problem called Isometric Lattice P...

متن کامل

Quantum Learning Algorithms and Post-Quantum Cryptography

Quantum algorithms have demonstrated promising speed-ups over classical algorithms in the context of computational learning theory despite the presence of noise. In this work, we give an overview of recent quantum speed-ups, revisit the Bernstein-Vazirani algorithm in a new learning problem extension over an arbitrary cyclic group and discuss recent applications in cryptography, such as the Lea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE journal on selected areas in information theory

سال: 2021

ISSN: ['2641-8770']

DOI: https://doi.org/10.1109/jsait.2021.3054598