亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms

计算机科学 后量子密码学 量子计算机 理论计算机科学 量子密码学 量子算法 密码 计算机工程 算法 量子信息 公钥密码术 计算机安全 量子 加密 量子力学 物理
作者
Manohar Raavi,Simeon Wuthier,Pranav Chandramouli,Yaroslav Balytskyi,Xiaobo Zhou,Sang‐Yoon Chang
出处
期刊:Lecture Notes in Computer Science 卷期号:: 424-447 被引量:14
标识
DOI:10.1007/978-3-030-78375-4_17
摘要

Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum era and withstand the attacks equipped with quantum computing, the security and cryptography communities are designing new quantum-resistant public-key ciphers. National Institute of Standards and Technology (NIST) is collecting and standardizing the post-quantum ciphers, similarly to its past involvements in establishing DES and AES as symmetric cipher standards. The NIST finalist algorithms for public-key signatures are Dilithium, Falcon, and Rainbow. Finding common ground to compare these algorithms can be difficult because of their design, the underlying computational hardness assumptions (lattice based vs. multivariate based), and the different metrics used for security strength analyses in the previous research (qubits vs. quantum gates). We overcome such challenges and compare the security and the performances of the finalist post-quantum ciphers of Dilithium, Falcon, and Rainbow. For security comparison analyses, we advance the prior literature by using the depth-width cost for quantum circuits (DW cost) to measure the security strengths and by analyzing the security in Universal Quantum Gate Model and with Quantum Annealing. For performance analyses, we compare the algorithms’ computational loads in the execution time as well as the communication costs and implementation overheads when integrated with Transport Layer Security (TLS) and Transmission Control Protocol (TCP)/Internet Protocol (IP). Our work presents a security comparison and performance analysis as well as the trade-off analysis to inform the post-quantum cipher design and standardization to protect computing and networking in the post-quantum era.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
45秒前
小蘑菇应助郡邑采纳,获得10
1分钟前
zsmj23完成签到 ,获得积分0
1分钟前
科研通AI2S应助谨慎建辉采纳,获得10
2分钟前
这学真难读下去完成签到,获得积分10
2分钟前
yanzilin完成签到 ,获得积分10
2分钟前
猪仔5号发布了新的文献求助10
2分钟前
谨慎建辉完成签到,获得积分10
3分钟前
猪仔5号发布了新的文献求助10
3分钟前
科研通AI2S应助谨慎建辉采纳,获得10
3分钟前
4分钟前
冷静初彤应助科研通管家采纳,获得10
4分钟前
4分钟前
Auralis完成签到 ,获得积分10
4分钟前
4分钟前
4分钟前
务实的初蝶完成签到,获得积分10
4分钟前
cc发布了新的文献求助10
4分钟前
科研通AI2S应助cc采纳,获得10
4分钟前
猪仔5号完成签到,获得积分10
4分钟前
5分钟前
中華人民共和完成签到,获得积分10
5分钟前
5分钟前
5分钟前
7分钟前
猪仔5号发布了新的文献求助10
7分钟前
谷雨发布了新的文献求助10
7分钟前
搜集达人应助谷雨采纳,获得10
7分钟前
慕青应助勇往直前采纳,获得10
7分钟前
7分钟前
dawn完成签到,获得积分10
7分钟前
7分钟前
7分钟前
dawn发布了新的文献求助10
7分钟前
勇往直前发布了新的文献求助10
7分钟前
郡邑发布了新的文献求助10
7分钟前
7分钟前
猪仔5号发布了新的文献求助10
8分钟前
行走完成签到,获得积分10
8分钟前
8分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Kolmogorov, A. N. Qualitative study of mathematical models of populations. Problems of Cybernetics, 1972, 25, 100-106 800
FUNDAMENTAL STUDY OF ADAPTIVE CONTROL SYSTEMS 500
微纳米加工技术及其应用 500
Nanoelectronics and Information Technology: Advanced Electronic Materials and Novel Devices 500
Performance optimization of advanced vapor compression systems working with low-GWP refrigerants using numerical and experimental methods 500
Constitutional and Administrative Law 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5302883
求助须知:如何正确求助?哪些是违规求助? 4449956
关于积分的说明 13848801
捐赠科研通 4336251
什么是DOI,文献DOI怎么找? 2380859
邀请新用户注册赠送积分活动 1375812
关于科研通互助平台的介绍 1342188