已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms

计算机科学 后量子密码学 量子计算机 理论计算机科学 量子密码学 量子算法 密码 计算机工程 算法 量子信息 公钥密码术 计算机安全 量子 加密 量子力学 物理
作者
Manohar Raavi,Simeon Wuthier,Pranav Chandramouli,Yaroslav Balytskyi,Xiaobo Zhou,Sang‐Yoon Chang
出处
期刊:Lecture Notes in Computer Science 卷期号:: 424-447 被引量:14
标识
DOI:10.1007/978-3-030-78375-4_17
摘要

Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum era and withstand the attacks equipped with quantum computing, the security and cryptography communities are designing new quantum-resistant public-key ciphers. National Institute of Standards and Technology (NIST) is collecting and standardizing the post-quantum ciphers, similarly to its past involvements in establishing DES and AES as symmetric cipher standards. The NIST finalist algorithms for public-key signatures are Dilithium, Falcon, and Rainbow. Finding common ground to compare these algorithms can be difficult because of their design, the underlying computational hardness assumptions (lattice based vs. multivariate based), and the different metrics used for security strength analyses in the previous research (qubits vs. quantum gates). We overcome such challenges and compare the security and the performances of the finalist post-quantum ciphers of Dilithium, Falcon, and Rainbow. For security comparison analyses, we advance the prior literature by using the depth-width cost for quantum circuits (DW cost) to measure the security strengths and by analyzing the security in Universal Quantum Gate Model and with Quantum Annealing. For performance analyses, we compare the algorithms’ computational loads in the execution time as well as the communication costs and implementation overheads when integrated with Transport Layer Security (TLS) and Transmission Control Protocol (TCP)/Internet Protocol (IP). Our work presents a security comparison and performance analysis as well as the trade-off analysis to inform the post-quantum cipher design and standardization to protect computing and networking in the post-quantum era.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
沐南完成签到 ,获得积分10
1秒前
香蕉新筠发布了新的文献求助30
1秒前
胡图图发布了新的文献求助10
2秒前
fifi发布了新的文献求助10
2秒前
3秒前
4秒前
义气一德发布了新的文献求助10
8秒前
kytlnj发布了新的文献求助30
8秒前
科研通AI6.4应助Hu6868采纳,获得10
9秒前
Enso完成签到 ,获得积分10
10秒前
sunnyliu发布了新的文献求助10
12秒前
CipherSage应助胡图图采纳,获得30
13秒前
13秒前
13秒前
FashionBoy应助不知名网友采纳,获得10
15秒前
zz发布了新的文献求助10
15秒前
义气一德应助张本丁采纳,获得10
15秒前
xhy关注了科研通微信公众号
17秒前
热爱生活丶完成签到,获得积分10
18秒前
18秒前
Wsh完成签到,获得积分10
18秒前
lxl完成签到,获得积分20
18秒前
李健应助给好评采纳,获得10
19秒前
无花果应助义气一德采纳,获得10
20秒前
唯梦完成签到,获得积分10
22秒前
满意书包完成签到 ,获得积分10
22秒前
派大星发布了新的文献求助10
22秒前
Shiro发布了新的文献求助10
23秒前
haohaostudy发布了新的文献求助10
24秒前
24秒前
ding应助yyuu采纳,获得10
26秒前
Godyo完成签到,获得积分10
26秒前
彭于晏应助单薄凌晴采纳,获得10
27秒前
WY完成签到 ,获得积分10
27秒前
上官若男应助周新哲采纳,获得10
28秒前
28秒前
Lzk给QQ农场提示我菜死了的求助进行了留言
29秒前
Wsh发布了新的文献求助10
31秒前
31秒前
所所应助甜蜜一兰采纳,获得10
32秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Salmon nasal cartilage-derived proteoglycan complexes influence the gut microbiota and bacterial metabolites in mice 2000
The Composition and Relative Chronology of Dynasties 16 and 17 in Egypt 1500
Picture this! Including first nations fiction picture books in school library collections 1500
SMITHS Ti-6Al-2Sn-4Zr-2Mo-Si: Ti-6Al-2Sn-4Zr-2Mo-Si Alloy 850
Signals, Systems, and Signal Processing 610
Learning manta ray foraging optimisation based on external force for parameters identification of photovoltaic cell and module 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6376078
求助须知:如何正确求助?哪些是违规求助? 8189346
关于积分的说明 17293553
捐赠科研通 5429964
什么是DOI,文献DOI怎么找? 2872793
邀请新用户注册赠送积分活动 1849321
关于科研通互助平台的介绍 1694974