Cargando…

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism

In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to constr...

Descripción completa

Detalles Bibliográficos
Autores principales: Seyhan, Kübra, Akleylek, Sedat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/
https://www.ncbi.nlm.nih.gov/pubmed/37346686
http://dx.doi.org/10.7717/peerj-cs.1391
_version_ 1785060790750937088
author Seyhan, Kübra
Akleylek, Sedat
author_facet Seyhan, Kübra
Akleylek, Sedat
author_sort Seyhan, Kübra
collection PubMed
description In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism.
format Online
Article
Text
id pubmed-10280421
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-102804212023-06-21 Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism Seyhan, Kübra Akleylek, Sedat PeerJ Comput Sci Cryptography In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism. PeerJ Inc. 2023-05-26 /pmc/articles/PMC10280421/ /pubmed/37346686 http://dx.doi.org/10.7717/peerj-cs.1391 Text en © 2023 Seyhan and Akleylek https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Cryptography
Seyhan, Kübra
Akleylek, Sedat
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title_full Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title_fullStr Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title_full_unstemmed Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title_short Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
title_sort indistinguishability under adaptive chosen-ciphertext attack secure double-ntru-based key encapsulation mechanism
topic Cryptography
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/
https://www.ncbi.nlm.nih.gov/pubmed/37346686
http://dx.doi.org/10.7717/peerj-cs.1391
work_keys_str_mv AT seyhankubra indistinguishabilityunderadaptivechosenciphertextattacksecuredoublentrubasedkeyencapsulationmechanism
AT akleyleksedat indistinguishabilityunderadaptivechosenciphertextattacksecuredoublentrubasedkeyencapsulationmechanism