Lattice-based Cryptosystems Security and Functionality Enhan
发布时间:2021-04-13 10:42
密码系统可应用于我们数字世界中所需的许多应用。这包括执行安全加密和解密;消息签名的发布和认证。散列函数、对称密钥或私有密钥,如流密码和分组密码仍然被广泛用于快速消息加密。除此以外,一些更现代化的不对称密码技术,如RSA,DLP和ECC,对于其自身权限的使用至关重要。近年来,一些其他术语,如用于密码货币的块链,MPC(多方计算)等被不断创新以满足我们社会未来的需求。由于在量子计算机出现之前提出的量子算法在未来几年将不断被实例化,因此上述经典的对称和非对称密码系统对于强大的量子计算来讲不再具有相应的安全性。研究人员提出的基于代码和基于格的密码系统的新结构将在后量子计算时代提供系统安全保障。本文首先分析了第一代和第二代基于格的密码技术。传统采用的经典采样方法将遭受主动攻击的威胁。综合分析表明,第一代系统缺乏足够的安全措施,使得它们在LLL降维攻击下处于危险之中。另外,第一代系统对新的主动攻击呈现出较弱的防御能力。另一方面,虽然第二代结构提供了更好的效率和安全性来抵御主动攻击,但它们仍然缺乏由于无效和简单的采样方法导致的相当大的安全限制。接着,本文提出了两种新的采样算法,分别称为概率分布函数选...
【文章来源】:上海交通大学上海市 211工程院校 985工程院校 教育部直属院校
【文章页数】:78 页
【学位级别】:硕士
【文章目录】:
摘要
Abstract
List of Abbreviations
Chapter1 Introduction
1.1 Background and Motivation
1.2 Thesis Scope
1.3 Organization
Chapter2 Preliminary Knowledge
2.1 Notation
2.2 First Generation Systems
2.3 Second Generation Systems
Chapter3 Analysis on State of Art Cryptosytems
3.1 Analysis of First Generation Cryptosystems
3.2 Analysis of Second Generation Cryptosystems
3.3 Summary
Chapter4 Proposal of New Sampling Algorithms
4.1 APDF:Appointment of Probability Distribution Functions
4.2 CPDF:Combination of Probability Distribution Functions
4.3 Performance
Chapter5 Case Study Usage of APDF and CPDF Sampling Algorithms
5.1 Signature Protocols
5.2 IBE and Attribute-based Encryption
5.3 Hierarchical IBE and Responsibility Delegation
5.4 FHE and the Future of Lattice-based Cryptography
Chapter6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Acknowledgements
References
Publications
本文编号:3135150
【文章来源】:上海交通大学上海市 211工程院校 985工程院校 教育部直属院校
【文章页数】:78 页
【学位级别】:硕士
【文章目录】:
摘要
Abstract
List of Abbreviations
Chapter1 Introduction
1.1 Background and Motivation
1.2 Thesis Scope
1.3 Organization
Chapter2 Preliminary Knowledge
2.1 Notation
2.2 First Generation Systems
2.3 Second Generation Systems
Chapter3 Analysis on State of Art Cryptosytems
3.1 Analysis of First Generation Cryptosystems
3.2 Analysis of Second Generation Cryptosystems
3.3 Summary
Chapter4 Proposal of New Sampling Algorithms
4.1 APDF:Appointment of Probability Distribution Functions
4.2 CPDF:Combination of Probability Distribution Functions
4.3 Performance
Chapter5 Case Study Usage of APDF and CPDF Sampling Algorithms
5.1 Signature Protocols
5.2 IBE and Attribute-based Encryption
5.3 Hierarchical IBE and Responsibility Delegation
5.4 FHE and the Future of Lattice-based Cryptography
Chapter6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Acknowledgements
References
Publications
本文编号:3135150
本文链接:https://www.wllwen.com/kejilunwen/wltx/3135150.html