دسته بندی:
محاسبات کوانتومی - Quantum-Computing
سال انتشار:
2022
عنوان انگلیسی مقاله:
A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
ترجمه فارسی عنوان مقاله:
مرور طرحهای امضای کلید عمومی پسا کوانتومی برای ارتباطات امن خودرو
منبع:
ieee - ieee Transactions on Intelligent Transportation Systems;2022;23;9;10:1109/TITS:2021:3131668
نویسنده:
Kyung-Ah Shim
چکیده انگلیسی:
Basic security requirements such as confidentiality,
user authentication and data integrity, are assured by using
public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted
messages and authentication. The presence of a large scale
quantum computer would be a real threat to break the most
widely used public-key cryptographic algorithms in practice,
RSA, DSA, ECDSA signature schemes and Diffie-Hellman key
exchange. Thus, all security protocols and applications where
these public-key cryptographic algorithms are used are vulnerable to quantum-computer attacks. There are five directions of
cryptographic primitives secure against a quantum computer:
multivariate quadratic equation-based, hash-based, lattice-based,
code-based and supersingular isogeny-based cryptography. These
primitives could serve as replacements for current public-key
cryptographic algorithms to prepare for post-quantum era. It is
important to prioritize the fields to be replaced by post-quantum
cryptography (PQC) since it is hard to replace the currently
deployed PKC with PQC at the same time. The fields directly
connected to human life such as vehicular communications should
be the primary targets of PQC applications. This survey is
dedicated to providing guidelines for adapting the most suitable
post-quantum candidates to the requirements of various devices
and suggesting efficient and physically secure implementations
that can be built into existing embedded applications as easily
as traditional PKC. It focuses on the five types of post-quantum
signature schemes and investigates their theoretical backgrounds,
structures, state-of-the-art constructions and implementation
aspects on various platforms raging from resource constrained
IoT devices to powerful servers connected to the devices for
secure communications in post-quantum era. It offers appropriate solutions to find tradeoffs between key sizes, signature
lengths, performance, and security for practical applications.
Index Terms— Implementation attack | post-quantum cryptography | public-key signature scheme | quantum algorithm | Shor algorithm | side-channel attack.
قیمت: رایگان
توضیحات اضافی:
تعداد نظرات : 0