{"title":"An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves","authors":"Weiwei Han, D. He","doi":"10.1109/ETCS.2010.22","DOIUrl":null,"url":null,"abstract":"All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key agreement protocols, which is against the attack of quantum computer, is proposed. The strength of the proposed protocol is based on the problem of searching for an isogeny between elliptic curves. The time complexity for solving this problem is exponential, and the problem seems to be hard for solving with a quantum computer. The proposed protocol can provide the security properties known session key security, forward security, resistance to key-compromise impersonation attack and to unknown key-share attack, key control.