![Quantum-Resistant Key Agreement and Key Encapsulation için kapak resmi Quantum-Resistant Key Agreement and Key Encapsulation için kapak resmi](/client/assets/d79c3e4af2b6d196/ctx/images/no_image.png)
Quantum-Resistant Key Agreement and Key Encapsulation
Başlık:
Quantum-Resistant Key Agreement and Key Encapsulation
Yazar:
Robinson, Angela, author.
ISBN:
9780438012981
Yazar Ek Girişi:
Fiziksel Tanımlama:
1 electronic resource (89 pages)
Genel Not:
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Advisors: Rainer Steinwandt Committee members: David Arnold; María Isabel Gonzalez Vasco; Koray Karabina; Lee Klingler.
Özet:
We explore quantum-resistant key establishment and hybrid encryption. We find that while the discrete logarithm problem is effciently solved by a quantum computer using Shor's algorithm, some instances are insecure even using classical computers. The discrete logarithm problem based on a symmetric group Sn is efficiently solved in polynomial time.
We design a PUF-based 4-round group key establishment protocol, adjusting the model to include a physical channel capable of PUF transmission, and modify adversarial capabilities with respect to the PUFs. The result is a novel group key establishment protocol which avoids computational hardness assumptions and achieves key secrecy.
We contribute a hybrid encryption scheme by combining a key encapsulation mechanism (KEM) with a symmetric key encryption scheme by using two hash functions. We require only one-way security in the quantum random oracle model (QROM) of the KEM and one-time security of the symmetric encryption scheme in the QROM. We show that this hybrid scheme is IND-CCA secure in the QROM. We rely on a powerful theorem by Unruh that provides an upper bound on indistinguishability between the output of a random oracle and a random string, when the oracle can be accessed in quantum superposition. Our result contributes to the available IND-CCA secure encryption schemes in a setting where quantum computers are under adversarial control.
Finally, we develop a framework and describe biometric visual cryptographic schemes generically under our framework. We formalize several security notions and definitions including sheet indistinguishability, perfect indistinguishability, index recovery, perfect index privacy, and perfect resistance against false authentication. We also propose new and generic strategies for attacking e-BVC schemes such as new distinguishing attack, new index recovery, and new authentication attack. Our quantitative analysis verifies the practical impact of our framework and offers concrete upper bounds on the security of e-BVC.
Notlar:
School code: 0119
Konu Başlığı:
Tüzel Kişi Ek Girişi:
Mevcut:*
Yer Numarası | Demirbaş Numarası | Shelf Location | Lokasyon / Statüsü / İade Tarihi |
---|---|---|---|
XX(680485.1) | 680485-1001 | Proquest E-Tez Koleksiyonu | Arıyor... |
On Order
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
:
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.