咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Key Exchange Protocol Based on... 收藏

Key Exchange Protocol Based on Tensor Decomposition Problem

Key Exchange Protocol Based on Tensor Decomposition Problem

作     者:MAO Shaowu ZHANG Huanguo WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 

作者机构:Computer School of Wuhan UniversityThe Key Laboratory of Aerospace Information Security and Trusted ComputingMinistry of EducationWuhan 430072Hubei ProvinceChina China University of GeosciencesWuhan 430074Hubei ProvinceChina Hebei UniversitySchool of Computer Science and TechnologyHebei UniversityBaoding 071002China 

出 版 物:《China Communications》 (中国通信(英文版))

年 卷 期:2016年第13卷第3期

页      面:174-183页

核心收录:

学科分类:0810[工学-信息与通信工程] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0839[工学-网络空间安全] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386) the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004) the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008) Major State Basic Research Development Program of China(973 Program)(No.2014CB340600) the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440) 

主  题:密钥交换协议 张量分解 安全性分析 量子计算 单向函数 分解问题 密钥协议 密码学 

摘      要:The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分