期刊文献+

量子计算的挑战与思考 被引量:8

The Challenge of Quantum Computing to Information Security and Our Countermeasures
在线阅读 下载PDF
导出
摘要 量子计算时代使用什么密码,是摆在我们面前的紧迫的战略问题,研究并建立我国独立自主的抗量子计算密码是唯一正确的选择.从基于HASH函数的数字签名、基于格的公钥密码、MQ公钥密码、基于纠错码的公钥密码4个方面讨论了抗量子密码的发展现状,介绍了自己的研究工作,并从量子信息论、量子计算理论、量子计算环境下的密码安全性、抗量子计算密码的构造理论与关键技术4个方面给出了进一步研究的建议. What cryptosystem to use is a severe challenge that we face in the quantum computing era. It is the only correct choice to research and establish an independent resistant quantum computing cryptosystem. This paper introduces to the research and development of resistant quantum computing cryptography, especially the signature scheme based on HASH function,lattice -based public key eryptosystem,MQ public key cryptosystem and public key cryptosystem based on error correcting codes. Also the paper gives some suggestions for further research on the quantum information theory, the complexity theory of quantum computing,design and analysis of resistant quantum computing cryptosystems .
出处 《云南民族大学学报(自然科学版)》 CAS 2011年第5期388-395,共8页 Journal of Yunnan Minzu University:Natural Sciences Edition
基金 国家自然科学基金(60970115 91018008)
关键词 信息安全 密码学 量子计算 抗量子计算密码 information security cryptography quantum computing resistant quantum computing cryptography
作者简介 张焕国(1945-),男,教授,博士生导师.主要研究方向:信息安全、密码学、可信计算机、容错计算.
  • 相关文献

参考文献52

  • 1张镇九,张昭理,李爱民.量子计算与通信保密[M].武汉:华中师范大学出版社,2002.
  • 2管海明.国外量子计算机进展、对信息安全的挑战与对策[J].计算机安全,2009(4):1-5. 被引量:4
  • 3GROVER L K. A fast quantum mechanical algorithm for dalabase search[ C]// Proceedings of the Twenty - Eighth Annual Symposium on the Theory of Computing. New York: ACM Press, 1996.
  • 4SHOR P W. Polynomial - time algorithms for prime factori- zation and discrete logarithms on a quantum computer [ J ]. SIAM J Computer, 1997(26) :1 484 -1 509.
  • 5HANKERSON D, MENEZES A, VANSTON S. 椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.
  • 6卢明欣,来学嘉,肖国镇,秦磊.基于DNA技术的对称加密方法[J].中国科学(E辑),2007,37(2):175-182. 被引量:17
  • 7BERNSTEIN D J, BUCHMANN J A, DAHMEN E. Post - quantum cryptography [ M ]. Berlin : Springer, 2009.
  • 8MERKLE R C. A certified digital signature [ C]//Ad- vances in Cryptology- CRYPTO 1989 Proceedings, LNCS. Berlin:Springer, 1989,435:218 -238.
  • 9NIST. Plan for new cryptographic hash functions[ EB/OL]. [ 2010 - 12 -30 ]. http ://www. hist. gov/hash -function/.
  • 10BUCHMANN J, CORONADO C, DAHMEN E, et al. CMSS--an improved Merkle signaturescheme [ C ]//Pro- ceedings of INDOCRYPT 2006, LNCS. Berlin: Springer - Verlag, 2006,4329:349 - 363.

二级参考文献173

  • 1陈晓峰,王育民.公钥密码体制研究与进展[J].通信学报,2004,25(8):109-118. 被引量:28
  • 2肖国镇,卢明欣,秦磊,来学嘉.密码学的新领域——DNA密码[J].科学通报,2006,51(10):1139-1144. 被引量:14
  • 3唐樨瑾,冯勇.Dixon结式在密码学中的应用[J].软件学报,2007,18(7):1738-1745. 被引量:9
  • 4管海明.公钥密码如何应对量子计算的挑战?[J].信息安全与通信保密,2007,29(8):53-54. 被引量:2
  • 5Ralph C Merkle. A certified digital signature[ A]. Advances in Cryptology-CRYPTO' 89 [ C ]. Berlin: Springer-Vedag, 1989. 218 - 238.
  • 6R L Rivest,A Shamir, L Adleman. A method for obtaining digital signatures and public-key cryptosystems[J]. New York: Communications of the ACM, 1978,21 (2) : 120 - 126.
  • 7T Elgamal. A aublic key cryptosystem and a signature scheme based on discrete logarithms [ A ]. Advances in Cryptology- CRYPTO' 89[ C]. Berlin: Springer-Verlag, 1985.10 - 18.
  • 8D Johnson. A Menezes. The Elliptic Curve Digital Signature Algorithm (ECDSA) [ R ]. Waterloo: Technical report CORR, 1999.99- 34.
  • 9Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin D oring, and Elena Klintsevich. CMSS-an improved Merlde signature scheme[A]. Proc. Progress in Cryptology-INDOCRYPT [C]. Berlin: Springer-Verlag, 2006. 431 - 238.
  • 10Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya,and Camille Vuillaume. Merkle signatures with virtually unlimited signature capacity[A]. In Proc Progress in Cryptology-INDOCRYPT[C]. Berlin: Springer-Verlag, 2007.31 - 45.

共引文献87

同被引文献58

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部