首页 | 官方网站   微博 | 高级检索  
     

基于格理论的装备保障信息网络快速身份认证方案
引用本文:张建航,曹泽阳,徐庆征,贺 健.基于格理论的装备保障信息网络快速身份认证方案[J].电讯技术,2019,59(9):995-1001.
作者姓名:张建航  曹泽阳  徐庆征  贺 健
作者单位:空军工程大学 防空反导学院,西安710051;国防科技大学 信息通信学院,西安710106;空军工程大学 防空反导学院,西安,710051;国防科技大学 信息通信学院,西安,710106
基金项目:国家自然科学基金资助项目(61305083);国家留学基金项目(201703170064)
摘    要:量子算法和量子计算机对装备保障信息网络的认证方案已构成严重的潜在威胁。针对当前装备保障信息网络身份认证方案无法抵抗量子计算机攻击、认证效率相对较低的问题,引入格理论的本原格抽样算法和双峰高斯抽样技术,提出了装备保障信息网络在量子环境下安全且快速的身份认证方案,给出了方案的正确性、安全性的理论证明以及方案运行效率的比较分析。结果表明,基于随机预言机证明模型,该方案在小整数解问题困难性假设下达到了适应性选择身份和选择消息攻击的存在性不可伪造性;在保证安全的前提下,新方案在私钥提取阶段和身份认证阶段的运行效率均高于已有的几个同类格基身份认证方案。这为提高我国装备保障信息网络安全认证能力提供了新的思路和方法。

关 键 词:量子环境  装备保障信息网络  身份认证  格理论

An efficient identity-based authentication scheme for equipment support information network using lattice theory
ZHANG Jianhang,CAO Zeyang,XU Qingzheng and HE Jian.An efficient identity-based authentication scheme for equipment support information network using lattice theory[J].Telecommunication Engineering,2019,59(9):995-1001.
Authors:ZHANG Jianhang  CAO Zeyang  XU Qingzheng and HE Jian
Abstract:The quantum algorithms and quantum computer have posed a serious potential threat to the authentication schemes of equipment support information network.The current identity-based authentication schemes of equipment support information network cannot resist quantum computer attack.And the efficiency of these schemes is low.To solve these problems,the first identity-based authentication scheme using the primitive lattice sampling algorithm and the bimodal Gaussian sampling is proposed.And the scheme is efficient and correct under the quantum environment.The correctness,theoretical security proof and efficiency comparison of the new scheme are given.The results show that the scheme achieves existential unforgeability against adaptively chosen identity and message attacks under the small integer solution assumption in the random oracle model.Compared with the several prior authentication schemes designed by the same type lattice-based cryptography theory,the new scheme has higher efficiency in both the key extraction phase and authentication phase under safety.This provides a new idea and method to improve China''s security authentication capability of equipment support information network.
Keywords:quantum environment  equipment support information network  identity-based authentication  lattice theory
本文献已被 万方数据 等数据库收录!
点击此处可从《电讯技术》浏览原始摘要信息
点击此处可从《电讯技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号