Netinfo Security ›› 2020, Vol. 20 ›› Issue (10): 92-99.doi: 10.3969/j.issn.1671-1122.2020.10.012

Previous Articles     Next Articles

A Post Quantum Authenticated Key Exchange Protocol Based on LWE

LI Yu, HAN Yiliang(), LI Zhe, ZHU Shuaishuai   

  1. School of Cryptographic Engineering, Engineering University of PAP, Xi’an 710086, China
  • Received:2020-04-15 Online:2020-10-10 Published:2020-11-25
  • Contact: HAN Yiliang E-mail:hanyil@163.com

Abstract:

Recently, the majority of key exchange protocols are based on ring-learning with errors. While the additional ring structure facilitates efficiency and storage, its actual security also needs to be further research. These protocols require a complex structure such as additional signatures to achieve authentication. In this paper, a post-quantum authenticated key exchange protocol based on LWE was proposed. The pre-computation is adopted to improve the efficiency of the protocol. It is verified that both parties of the protocol can correctly calculate the consistent session key. A series of security games are designed to prove the protocol proposed in this paper. The authentication is achieved by introducing the static public and secret keys in the extraction of shared bits and introducing a hash function in the calculation of the session key. The protocol can resist man-in-the-middle attacks and need no additional operations such as encryption or signature. There is currently no quantum algorithm that can distinguish between LWE distribution and uniform random distribution, so the proposed protocol can resist quantum computing attacks.

Key words: lattice-based cryptography, authenticated key exchange, learning with errors, post quantum cryptography

CLC Number: