Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms

计算机科学 后量子密码学 量子计算机 理论计算机科学 量子密码学 量子算法 密码 计算机工程 算法 量子信息 公钥密码术 计算机安全 量子 加密 量子力学 物理
作者
Manohar Raavi,Simeon Wuthier,Pranav Chandramouli,Yaroslav Balytskyi,Xiaobo Zhou,Sang‐Yoon Chang
出处
期刊:Lecture Notes in Computer Science 卷期号:: 424-447 被引量:14
标识
DOI:10.1007/978-3-030-78375-4_17
摘要

Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum era and withstand the attacks equipped with quantum computing, the security and cryptography communities are designing new quantum-resistant public-key ciphers. National Institute of Standards and Technology (NIST) is collecting and standardizing the post-quantum ciphers, similarly to its past involvements in establishing DES and AES as symmetric cipher standards. The NIST finalist algorithms for public-key signatures are Dilithium, Falcon, and Rainbow. Finding common ground to compare these algorithms can be difficult because of their design, the underlying computational hardness assumptions (lattice based vs. multivariate based), and the different metrics used for security strength analyses in the previous research (qubits vs. quantum gates). We overcome such challenges and compare the security and the performances of the finalist post-quantum ciphers of Dilithium, Falcon, and Rainbow. For security comparison analyses, we advance the prior literature by using the depth-width cost for quantum circuits (DW cost) to measure the security strengths and by analyzing the security in Universal Quantum Gate Model and with Quantum Annealing. For performance analyses, we compare the algorithms’ computational loads in the execution time as well as the communication costs and implementation overheads when integrated with Transport Layer Security (TLS) and Transmission Control Protocol (TCP)/Internet Protocol (IP). Our work presents a security comparison and performance analysis as well as the trade-off analysis to inform the post-quantum cipher design and standardization to protect computing and networking in the post-quantum era.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
舒服的映安完成签到 ,获得积分10
刚刚
lmh011115发布了新的文献求助10
1秒前
2秒前
一直向前发布了新的文献求助10
2秒前
End完成签到 ,获得积分10
3秒前
沉静的红酒完成签到,获得积分10
4秒前
yzxzdm完成签到 ,获得积分10
4秒前
Yara.H完成签到 ,获得积分10
4秒前
Meng完成签到,获得积分10
5秒前
7秒前
量子星尘发布了新的文献求助10
9秒前
包容追命发布了新的文献求助10
11秒前
11秒前
梦鱼完成签到,获得积分10
12秒前
小林不熬夜完成签到,获得积分10
12秒前
玛卡巴卡完成签到,获得积分10
13秒前
希尔伯特发布了新的文献求助10
15秒前
Jasper应助dailyyang采纳,获得10
15秒前
冬凌草完成签到 ,获得积分10
15秒前
阿若完成签到,获得积分10
15秒前
英姑应助单纯冰棍采纳,获得10
15秒前
高高从霜完成签到 ,获得积分10
16秒前
lmh011115完成签到,获得积分10
16秒前
包容追命完成签到,获得积分20
17秒前
zhenya完成签到,获得积分10
18秒前
xiang929完成签到 ,获得积分10
20秒前
小文子完成签到,获得积分10
20秒前
Mae完成签到 ,获得积分10
21秒前
21秒前
22秒前
22秒前
X欣完成签到,获得积分10
22秒前
lelele完成签到,获得积分10
22秒前
可爱的函函应助luxi0714采纳,获得10
24秒前
月儿完成签到 ,获得积分10
24秒前
小曾应助景清采纳,获得10
25秒前
25秒前
大力的忆霜完成签到,获得积分10
25秒前
贪玩大侠发布了新的文献求助10
26秒前
学不懂数学应助苹果沛柔采纳,获得10
26秒前
高分求助中
【提示信息,请勿应助】关于scihub 10000
Les Mantodea de Guyane: Insecta, Polyneoptera [The Mantids of French Guiana] 3000
徐淮辽南地区新元古代叠层石及生物地层 3000
The Mother of All Tableaux: Order, Equivalence, and Geometry in the Large-scale Structure of Optimality Theory 3000
Global Eyelash Assessment scale (GEA) 1000
Picture Books with Same-sex Parented Families: Unintentional Censorship 550
Research on Disturbance Rejection Control Algorithm for Aerial Operation Robots 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 冶金 细胞生物学 免疫学
热门帖子
关注 科研通微信公众号,转发送积分 4038446
求助须知:如何正确求助?哪些是违规求助? 3576149
关于积分的说明 11374627
捐赠科研通 3305875
什么是DOI,文献DOI怎么找? 1819354
邀请新用户注册赠送积分活动 892680
科研通“疑难数据库(出版商)”最低求助积分说明 815048