论文标题
基于网络编码的量子后加密
Network Coding-Based Post-Quantum Cryptography
论文作者
论文摘要
我们提出了一种新型混合通用网络编码密码系统(HUNCC),以高通信速率获得安全的量子后加密系统。我们提供的安全网络编码方案是混合的,因为它将信息理论的安全性与公钥密码术结合在一起。此外,该方案是一般的,可以应用于任何通信网络以及任何公钥密码系统。我们的混合方案基于个人保密的信息理论概念,传统上依赖这样的假设:窃听者只能观察到受信任当事方之间的通信联系的子集 - 这一假设通常是具有挑战性的。对于此设置,已经开发了几个代码构造,在该设置中,在在每个路径上传输之前,消息将消息呈线性混合,以确保仅观察一个子集的对手对每个单独消息都有足够的不确定性。 取而代之的是,在本文中,我们采用计算观点,并构建一个编码方案,其中在链接的子集中使用任意安全的加密系统,而与单个安全性类似的预处理相似。在此方案下,我们证明了1)对手的计算安全保证,该保证观察到整个链接2)对对手的信息理论安全保证,该保证观察到链接的一部分,3)信息速率,该信息速率接近网络的能力并极大地改善了当前解决方案。 我们计划的一个可能令人惊讶的结果是,为了确保计算安全级别B,使用计算后量子后方案加密单个链接就足够了。此外,随着通信链接数量的增加,信息速率也接近1。
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography. In addition, the scheme is general and can be applied to any communication network, and to any public-key cryptosystem. Our hybrid scheme is based on the information theoretic notion of individual secrecy, which traditionally relies on the assumption that an eavesdropper can only observe a subset of the communication links between the trusted parties - an assumption that is often challenging to enforce. For this setting, several code constructions have been developed, where the messages are linearly mixed before transmission over each of the paths in a way that guarantees that an adversary which observes only a subset has sufficient uncertainty about each individual message. Instead, in this paper, we take a computational viewpoint, and construct a coding scheme in which an arbitrary secure cryptosystem is utilized on a subset of the links, while a pre-processing similar to the one in individual security is utilized. Under this scheme, we demonstrate 1) a computational security guarantee for an adversary which observes the entirety of the links 2) an information theoretic security guarantee for an adversary which observes a subset of the links, and 3) information rates which approach the capacity of the network and greatly improve upon the current solutions. A perhaps surprising consequence of our scheme is that, to guarantee a computational security level b, it is sufficient to encrypt a single link using a computational post-quantum scheme. In addition, the information rate approaches 1 as the number of communication links increases.