{"title":"基于椭圆曲线间等同源的认证密钥协议","authors":"Weiwei Han, D. He","doi":"10.1109/ETCS.2010.22","DOIUrl":null,"url":null,"abstract":"All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves\",\"authors\":\"Weiwei Han, D. He\",\"doi\":\"10.1109/ETCS.2010.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.\",\"PeriodicalId\":193276,\"journal\":{\"name\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCS.2010.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves
All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.