Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms

计算机科学 后量子密码学 量子计算机 理论计算机科学 量子密码学 量子算法 密码 计算机工程 算法 量子信息 公钥密码术 计算机安全 量子 加密 量子力学 物理
作者
Manohar Raavi,Simeon Wuthier,Pranav Chandramouli,Yaroslav Balytskyi,Xiaobo Zhou,Sang‐Yoon Chang
出处
期刊:Lecture Notes in Computer Science 卷期号:: 424-447 被引量:14
标识
DOI:10.1007/978-3-030-78375-4_17
摘要

Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum era and withstand the attacks equipped with quantum computing, the security and cryptography communities are designing new quantum-resistant public-key ciphers. National Institute of Standards and Technology (NIST) is collecting and standardizing the post-quantum ciphers, similarly to its past involvements in establishing DES and AES as symmetric cipher standards. The NIST finalist algorithms for public-key signatures are Dilithium, Falcon, and Rainbow. Finding common ground to compare these algorithms can be difficult because of their design, the underlying computational hardness assumptions (lattice based vs. multivariate based), and the different metrics used for security strength analyses in the previous research (qubits vs. quantum gates). We overcome such challenges and compare the security and the performances of the finalist post-quantum ciphers of Dilithium, Falcon, and Rainbow. For security comparison analyses, we advance the prior literature by using the depth-width cost for quantum circuits (DW cost) to measure the security strengths and by analyzing the security in Universal Quantum Gate Model and with Quantum Annealing. For performance analyses, we compare the algorithms’ computational loads in the execution time as well as the communication costs and implementation overheads when integrated with Transport Layer Security (TLS) and Transmission Control Protocol (TCP)/Internet Protocol (IP). Our work presents a security comparison and performance analysis as well as the trade-off analysis to inform the post-quantum cipher design and standardization to protect computing and networking in the post-quantum era.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
小二郎应助活菌泡泡采纳,获得10
刚刚
2秒前
斯文败类应助喜宝采纳,获得10
3秒前
小蘑菇应助knight采纳,获得10
3秒前
4秒前
兰絮发布了新的文献求助10
4秒前
6秒前
6秒前
贝肯发布了新的文献求助10
6秒前
ll发布了新的文献求助10
7秒前
锂享生活完成签到,获得积分10
7秒前
7秒前
Adzuki0812发布了新的文献求助200
7秒前
9秒前
9秒前
期望应助Uuuuuuumi采纳,获得10
10秒前
11秒前
11秒前
Bambi发布了新的文献求助10
13秒前
君君完成签到 ,获得积分10
13秒前
活菌泡泡发布了新的文献求助10
13秒前
15秒前
qing发布了新的文献求助10
15秒前
16秒前
喜宝发布了新的文献求助10
16秒前
16秒前
无欲发布了新的文献求助10
16秒前
17秒前
Orange应助adeline采纳,获得10
18秒前
Lucas应助FFF采纳,获得10
18秒前
18秒前
Sor完成签到,获得积分10
18秒前
19秒前
木木完成签到,获得积分10
19秒前
knight发布了新的文献求助10
20秒前
21秒前
Sor发布了新的文献求助10
21秒前
21秒前
xixixiziwei完成签到,获得积分10
22秒前
aou应助砍柴人采纳,获得30
22秒前
高分求助中
Licensing Deals in Pharmaceuticals 2019-2024 3000
Effect of reactor temperature on FCC yield 2000
Very-high-order BVD Schemes Using β-variable THINC Method 1020
PraxisRatgeber: Mantiden: Faszinierende Lauerjäger 800
Mission to Mao: Us Intelligence and the Chinese Communists in World War II 600
The Conscience of the Party: Hu Yaobang, China’s Communist Reformer 600
Geochemistry, 2nd Edition 地球化学经典教科书第二版,不要epub版本 431
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3302491
求助须知:如何正确求助?哪些是违规求助? 2936970
关于积分的说明 8479687
捐赠科研通 2610817
什么是DOI,文献DOI怎么找? 1425377
科研通“疑难数据库(出版商)”最低求助积分说明 662347
邀请新用户注册赠送积分活动 646689