Cargando…
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to constr...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/ https://www.ncbi.nlm.nih.gov/pubmed/37346686 http://dx.doi.org/10.7717/peerj-cs.1391 |
_version_ | 1785060790750937088 |
---|---|
author | Seyhan, Kübra Akleylek, Sedat |
author_facet | Seyhan, Kübra Akleylek, Sedat |
author_sort | Seyhan, Kübra |
collection | PubMed |
description | In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism. |
format | Online Article Text |
id | pubmed-10280421 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-102804212023-06-21 Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism Seyhan, Kübra Akleylek, Sedat PeerJ Comput Sci Cryptography In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism. PeerJ Inc. 2023-05-26 /pmc/articles/PMC10280421/ /pubmed/37346686 http://dx.doi.org/10.7717/peerj-cs.1391 Text en © 2023 Seyhan and Akleylek https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Cryptography Seyhan, Kübra Akleylek, Sedat Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title | Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title_full | Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title_fullStr | Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title_full_unstemmed | Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title_short | Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism |
title_sort | indistinguishability under adaptive chosen-ciphertext attack secure double-ntru-based key encapsulation mechanism |
topic | Cryptography |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280421/ https://www.ncbi.nlm.nih.gov/pubmed/37346686 http://dx.doi.org/10.7717/peerj-cs.1391 |
work_keys_str_mv | AT seyhankubra indistinguishabilityunderadaptivechosenciphertextattacksecuredoublentrubasedkeyencapsulationmechanism AT akleyleksedat indistinguishabilityunderadaptivechosenciphertextattacksecuredoublentrubasedkeyencapsulationmechanism |