计算机应用 ›› 2019, Vol. 39 ›› Issue (7): 1997-2000.DOI: 10.11772/j.issn.1001-9081.2018122429

• 网络空间安全 • 上一篇    下一篇

基于改进版Niederreiter的双公钥密码方案

王众, 韩益亮   

  1. 武警工程大学 密码工程学院, 西安 710086
  • 收稿日期:2018-12-10 修回日期:2019-02-06 发布日期:2019-03-29 出版日期:2019-07-10
  • 通讯作者: 王众
  • 作者简介:王众(1995-),男,山东泰安人,硕士研究生,主要研究方向:抗量子密码;韩益亮(1977-),男,甘肃会宁人,教授,博士生导师,博士,主要研究方向:抗量子密码。
  • 基金资助:

    国家自然科学基金资助项目(61572521)。

Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem

<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>W<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>A<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>G<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>Z<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>h<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>o<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>g<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>,<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>H<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>A<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>Y<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>l<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>a<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>g<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>   

  1. College of Cryptology Engineering, Engineering University of PAP, Xi'an Shaanxi 710086, China
  • Received:2018-12-10 Revised:2019-02-06 Online:2019-03-29 Published:2019-07-10
  • Supported by:

    This work is partially supported by the National Natural Science Foundation of China (61572521).

摘要:

基于编码的密码体制可以有效地抵抗量子计算攻击,具有较好的可操作性以及数据压缩能力,是后量子时代密码方案的可靠候选者之一。针对量子时代中计算机数据的安全保密问题,对编码密码中的Niederreiter密码方案改进版进行深入研究,提出了一种与双公钥加密方式相结合的密码方案。所提方案的安全性相比Niederreiter方案改进版以及基于准循环低密度奇偶校验码(QC-LDPC)的Niederreiter双公钥加密方案得到提升,在密钥量方面相比传统Niederreiter密码方案的公钥量至少下降了32%,相比基于QC-LDPC码的Niederreiter双公钥加密方案也有效下降,在量子时代保证计算机数据安全表现出较强的可靠性。

关键词: 编码密码, Niederreiter密码体制, 系统码, 安全性分析, 效率分析

Abstract:

The code-based cryptosystem can effectively resist quantum computing attacks with good operability and data compression capability, and is one of the reliable candidates for the post-quantum era cryptographic scheme. Aiming at the security and confidentiality of computer data in the quantum era, the in-depth study of an improved Niederreiter cryptographic scheme in code-based cryptography was carried out, and a cryptographic scheme with combination of dual public-key encryption method was proposed. The security of the proposed scheme was improved compared with the improved Niederreiter scheme and the Niederreiter dual public-key encryptographic scheme based on Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) code. The amount of keys in the scheme is at least 32% lower than that of traditional Niederreiter scheme, and is also effectively reduced compared with that of the Niederreiter dual public-key encryptographic scheme based on QC-LDPC code, which shows the strong reliability for ensuring computer data security in the quantum age.

Key words: code-based cryptography, Niederreiter cryptosystem, system code, security analysis, efficiency analysis

中图分类号: