[author_cn_name].[cn_title][J].空军工程大学学报:自然科学版,[year_id],[volume]([issue]):[start_page]-[end_page] 基于格密码理论的装备保障信息网络身份认证方案- Identity Based Authentication Scheme for Equipment Support Information Network Using Latticed Based Cryptography Theory
文章摘要
张建航,曹泽阳,徐庆征,贺健.基于格密码理论的装备保障信息网络身份认证方案[J].空军工程大学学报:自然科学版,2019,20(1):79-83
基于格密码理论的装备保障信息网络身份认证方案
Identity Based Authentication Scheme for Equipment Support Information Network Using Latticed Based Cryptography Theory
  
DOI:
中文关键词: 装备保障信息网络  量子计算机  格密码理论  身份认证
英文关键词: equipment support information network  quantum computer  latticed based cryptography theory  identity authentication
基金项目:国家自然科学基金(61305083)
作者单位
张建航,曹泽阳,徐庆征,贺健 1.空军工程大学防空反导学院,西安,7100512.国防科技大学信息通信学院,西安,710106 
摘要点击次数: 44
全文下载次数: 53
中文摘要:
      针对当前装备保障信息网络身份认证方案无法抵抗正在崛起的量子计算机攻击及认证效率较低的问题,基于新的格密码理论,提出了装备保障信息网络在量子计算环境下安全且快速的身份认证方案。该方案采用理想格结构生成方案的主密钥,将装备身份信息输入到原像抽样函数中得出装备身份信息对应的认证密钥,利用无陷门的采样技术产生出装备的认证信息。结果表明:该方案在理想小整数解问题困难性假设的条件下,达到了适应性选择身份和选择消息攻击下的不可伪造性安全;在保证安全的前提下,该方案在达到相同的安全等级水平时在认证速率和验证速率方面均高于传统基于RSA和ECC的认证方案。
英文摘要:
      The current equipment support information network is threatened by the quantum computer. The current identity authentication schemes for equipment support information network cannot resistant quantum computer attack, and the efficiency of these schemes is low. The first identity authentication scheme which is secure under the quantum computer environment for equipment support information network from lattice based new cryptographic assumption is presented. Firstly, the master keys are generated from ideal lattice. Secondly, the authentication key is generated using preimage sampleable functions with the equipment identity information. Thirdly, the authentication information of the equipment is produced by non trap door sampling technique. The scheme achieves existential unforgeability against adaptive chosen identity and message under the small integer solution assumption. Compared with the traditional schemes such as RSA and ECC authentication schemes, our scheme has higher authentication and verify efficiency at the same level of security.
查看全文   查看/发表评论  下载PDF阅读器
关闭