信息网络安全 ›› 2014, Vol. 14 ›› Issue (10): 54-58.doi: 10.3969/j.issn.1671-1122.2014.10.010

• 技术研究 • 上一篇    下一篇

一种基于编码的公钥密码体制的参数选择研究

徐权佐, 蔡庆军   

  1. 广州大学数学与信息科学学院,广东广州 510006
  • 收稿日期:2014-08-07 出版日期:2014-10-01 发布日期:2015-08-17
  • 作者简介:

    徐权佐(1990-),男,广东,硕士研究生,主要研究方向:密码学与信息安全;蔡庆军(1976-),男,黑龙江,副教授,博士,主要研究方向:密码学与信息安全。

  • 基金资助:
    国家自然科学基金[11371106]

Research on Parameter Selection of a Code-based Public-Key Cryptosystem

XU Quan-zuo, CAI Qing-jun   

  1. School of Mathematics and Information Science of Guangzhou University, Guangzhou Guangdong 510006, China
  • Received:2014-08-07 Online:2014-10-01 Published:2015-08-17

摘要:

TCHo公钥密码体制是“Trapdoor Cipher,Hardware Oriented”的缩写,是受快速相关攻击中的陷门密码启发而得到的一种基于编码的公钥密码体制。它能抵抗量子计算机的攻击,是一种后量子密码体制。2006年,Finiasz 和Vaudenay 提出了TCHo公钥密码体制的一种非多项式解密时间的早期版本。2007年,Aumasson 等人介绍了使用启发式算法多项式复杂度的TCHo 密码体制。2013年,Alexandre 和Serge 在“Advances in Network Analysis and its Applications” 一书中系统介绍了TCHo 密码体制。它的安全性基于低重量多项式的倍式问题和带噪声的LFSR区分问题,因此参数的选择决定了密码体制的安全性与可靠性。文章详细介绍了TCHo密码体制,针对TCHo密码体制的参数选择进行了分析,指出该密码体制达到唯一译码的条件,并给出了衡量密码体制可靠性程度的计算公式,同时提出了参数选择的一种方法,从而使密码体制更可靠。

关键词: 公钥密码体制, 基于编码的密码体制, 后量子密码学

Abstract:

TCHo is short for “Trapdoor Cipher, Hardware Oriented” . It is a code-based public-key cryptosystem which is inspired by fast correlation attack. TCHo cryptosystem can resist the attacks from quantum computers which is a post-quantum cryptosystem. An early version was proposed in 2006 by Finiasz and Vaudenay with non-polynomial (though practical) decryption time. The later version came in 2007 with more co-authors. It reached competitive (heuristic) polynomial complexity and IND-CPA security. In 2013, Alexandre and Serge introduces the TCHo cryptosystem in Advances in Network Analysis and its Applications. The security of the cryptosystem relies on the hardness of finding a multiple polynomial with low weight and on the hardness of distinguishing between the out of the LFSR with noise and some random sources, hence, the parameter selection of this cryptosystem determines the security and reliability. This paper introduces the TCHo cryptosystem in detail and analyzes the parameter selection. This paper also points out the condition of achieving the only decoding and discusses the calculation formula for measuring the reliability level of the cryptosystem. At the same time, a method of parameter selection is presented so that the cryptosystem is more reliable.

Key words: public-key cryptosystem, code-based cryptosystem, post-quantum cryptography

中图分类号: