Cryptography from Post-Quantum Assumptions
نویسنده
چکیده
In this thesis we present our contribution in the field of post-quantum cryptography. We introduce a new notion of weakly Random-Self-Reducible public-key cryptosystem and show how it can be used to implement secure Oblivious Transfer. We also show that two recent (Post-quantum) cryptosystems can be considered as weakly RandomSelf-Reducible. We introduce a new problem called Isometric Lattice Problem and reduce graph isomorphism and linear code equivalence to this problem. We also show that this problem has a perfect zero-knowledge interactive proof with respect to a malicious verifier; this is the only hard problem in lattices that is known to have this property. Résumé Dans cette thèse nous exposons nos contributions au domaine de la cryptographie post-quantique. Nous présentons d’abord la nouvelle notion de système cryptographique aléatoirement-auto-réductible au sens faible et démontrons comment elle peut être utilisée afin d’obtenir une version sécurisée du transfert inconscient. Nous démontrons ensuite que deux systèmes cryptographiques (post-quantiques) récents peuvent être considérés comme exemples de systèmes aléatoirement-auto-réductibles au sens faible. De plus, nous présentons un nouveau problème cryptographique de treillis isométriques auquel nous réduisons le problème d’ isomorphisme de graphes et celui d’ équivalence de codes linéaires . Nous montrons enfin que ce nouveau problème possède une preuve interactive à connaissance nulle parfaite par rapport à tous les vérificateurs (malveillants) ; celui-ci est le seul problème de treillis connu possédant une telle propriété.
منابع مشابه
Attribute - Based Functional Encryption on Lattices ( Extended
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Speci cally, we build an e cient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learning-with-errors intractability in the standard model. This is a longer vers...
متن کاملAttribute-Based Functional Encryption on Lattices
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Specifically, we build an efficient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learningwith-errors intractability in the standard model.
متن کاملQuantum and Post Quantum Cryptography
Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermined the security assumptions upon which currently used public key cryptographic algorithms are ba...
متن کاملConstructing elliptic curve isogenies in quantum subexponential time
Given two elliptic curves over a finite field having the same cardinality and endomorphism ring, it is known that the curves admit an isogeny between them, but finding such an isogeny is believed to be computationally difficult. The fastest known classical algorithm takes exponential time, and prior to our work no faster quantum algorithm was known. Recently, public-key cryptosystems based on t...
متن کاملSelecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidates in this area is the Rainbow signature scheme, which was first proposed by J. Ding and D. Schmidt in 2005. In this paper we develop a model of security for the Rainbow signature scheme. We use this model to find para...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015