信息安全研究 ›› 2025, Vol. 11 ›› Issue (7): 661-.

• 学术论文 • 上一篇    下一篇

后量子匿名通信认证密钥协商协议

刘笑颜1倪亮2,3谷兵珂2张亚伟2周恒昇2   

  1. 1(郑州科技学院大数据与人工智能学院郑州450064)
    2(中原工学院计算机学院郑州450007)
    3(河南省工业互联网安全大数据发展创新实验室(中原工学院)郑州450007)
  • 出版日期:2025-07-29 发布日期:2025-07-29
  • 通讯作者: 刘笑颜 硕士.主要研究方向为网络安全与密码学. 2021107255@zut.edu.cn
  • 作者简介:刘笑颜 硕士.主要研究方向为网络安全与密码学. 2021107255@zut.edu.cn 倪亮 博士,副教授.主要研究方向为网络安全与密码学. niliang402@zut.edu.cn 谷兵珂 硕士.主要研究方向为网络安全与密码学. 604452458@qq.com 张亚伟 硕士.主要研究方向为网络安全与密码学. 1220749947@qq.com 周恒昇 硕士.主要研究方向为网络安全与密码学. zhouhengsheng333@163.com

Authenticated Key Agreement Protocol for Postquantum  Anonymous Communication

Liu Xiaoyan1, Ni Liang2,3, Gu Bingke2, Zhang Yawei2, and Zhou Hengsheng2   

  1. 1(School of Big Data and Artificial Intelligence, Zhengzhou University of Science and Technology, Zhengzhou 450064)
    2(School of Computer, Zhongyuan Institute of Technology, Zhengzhou 450007)
    3(Henan Industrial Internet Security Big Data Development and Innovation Laboratory (Zhongyuan Institute of Technology), Zhengzhou 450007)
  • Online:2025-07-29 Published:2025-07-29

摘要: 网络中数据规模越来越庞大,这些数据与用户的关联度非常高,一旦发生数据泄露,用户的身份信息和个人隐私将受到严重威胁.然而基于传统数论的加密体系随着量子技术的飞速发展已经变得不再安全.针对这一问题,提出了一种基于格密码的匿名身份认证密钥协商协议,基于格密码的安全性难题可以抵御量子攻击,其安全性经过了安全模型和理论化分析,并与同类方案进行比较获得了显著的改进.该协议基于格密码的身份认证加密技术,能够完成相互认证并建立安全通信,能够优化公钥基础设施的证书系统组件部署.

关键词: 后量子密码, 基于身份的密码, 基于格的密码, 认证密钥协商, 匿名性

Abstract: As the scale of data in the network becomes more and more enormous. These data are highly associated with the users, once the data is leaked, the identity information and personal privacy of the users will be seriously threatened. The encryption system based on traditional number theory becomes no longer secure with the rapid development of quantum technology, in response to this problem, this paper proposes a key negotiation protocol that gives anonymous authentication on the lattice, based on lattice cryptography security challenges can resist quantum attacks, its security has been analyzed by the security model and theoretical and compared with similar schemes to obtain a significant improvement. This novel protocol is based on the authentication cryptography of lattice ciphers, which is capable of accomplishing mutual authentication and establishing secure communication, and is able to optimize the deployment of certificate system components of public key infrastructure.

Key words: postquantum cryptography, identitybased cryptography, latticebased cryptography, authenticated key agreement, anonymity

中图分类号: