• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

后量子密码密钥封装算法的弹性优化。

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.

机构信息

Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan.

Higher Polytechnic School, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain.

出版信息

Sensors (Basel). 2023 Jun 6;23(12):5379. doi: 10.3390/s23125379.

DOI:10.3390/s23125379
PMID:37420546
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10303738/
Abstract

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.

摘要

近年来,量子计算的发展揭示了传统公钥密码系统的不足之处。尽管 Shor 算法目前还无法在量子计算机上实现,但它表明非对称密钥加密在不久的将来将不再可行或安全。为了解决这一安全隐患,美国国家标准与技术研究院(NIST)已经开始寻找一种抗未来量子计算机发展的后量子加密算法。目前的重点是标准化抗量子计算机破解的非对称加密算法。近年来,这一点变得越来越重要。目前,标准化非对称加密算法的过程已经非常接近完成。本研究评估了两种后量子密码学(PQC)算法的性能,这两种算法都被选为 NIST 第四轮决赛选手。研究评估了密钥生成、封装和解密操作,深入了解了它们的效率和在实际应用中的适用性。为了实现安全高效的后量子加密,还需要进一步的研究和标准化工作。在为特定应用选择合适的后量子加密算法时,应考虑安全级别、性能要求、密钥大小和平台兼容性等因素。本文为后量子密码学研究人员和从业者提供了有价值的见解,有助于在量子计算时代选择合适的算法来保护机密数据的决策过程。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/720e8d3eab76/sensors-23-05379-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/ec62f2d330e4/sensors-23-05379-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/60511936a4ae/sensors-23-05379-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/c90bc242d008/sensors-23-05379-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/cb5879570ab2/sensors-23-05379-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/470434bf341e/sensors-23-05379-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/a9cba05fae43/sensors-23-05379-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/3b0ed2fcd8e1/sensors-23-05379-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/fbe4186fff75/sensors-23-05379-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/83359e7fd0b5/sensors-23-05379-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/be5c6ecee3f1/sensors-23-05379-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/1d33eab4b2aa/sensors-23-05379-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/6eec0693abf0/sensors-23-05379-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/eeedb41413e1/sensors-23-05379-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/b37aa12c8ea7/sensors-23-05379-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/69b2c8c61893/sensors-23-05379-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/8f8961278d64/sensors-23-05379-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/720e8d3eab76/sensors-23-05379-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/ec62f2d330e4/sensors-23-05379-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/60511936a4ae/sensors-23-05379-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/c90bc242d008/sensors-23-05379-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/cb5879570ab2/sensors-23-05379-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/470434bf341e/sensors-23-05379-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/a9cba05fae43/sensors-23-05379-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/3b0ed2fcd8e1/sensors-23-05379-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/fbe4186fff75/sensors-23-05379-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/83359e7fd0b5/sensors-23-05379-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/be5c6ecee3f1/sensors-23-05379-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/1d33eab4b2aa/sensors-23-05379-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/6eec0693abf0/sensors-23-05379-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/eeedb41413e1/sensors-23-05379-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/b37aa12c8ea7/sensors-23-05379-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/69b2c8c61893/sensors-23-05379-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/8f8961278d64/sensors-23-05379-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a60/10303738/720e8d3eab76/sensors-23-05379-g017.jpg

相似文献

1
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.后量子密码密钥封装算法的弹性优化。
Sensors (Basel). 2023 Jun 6;23(12):5379. doi: 10.3390/s23125379.
2
Transitioning organizations to post-quantum cryptography.推动组织过渡到后量子密码学。
Nature. 2022 May;605(7909):237-243. doi: 10.1038/s41586-022-04623-2. Epub 2022 May 11.
3
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.一种基于RISC-V架构的、用于美国国家标准与技术研究院后量子密码学标准化的可编程加密处理器。
Sensors (Basel). 2023 Nov 25;23(23):9408. doi: 10.3390/s23239408.
4
Post-Quantum Security: Opportunities and Challenges.后量子安全:机遇与挑战。
Sensors (Basel). 2023 Oct 26;23(21):8744. doi: 10.3390/s23218744.
5
Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.基于裁剪霍普菲尔德神经网络的多元密码系统的量子密码分析
IEEE Trans Neural Netw Learn Syst. 2022 Sep;33(9):5080-5084. doi: 10.1109/TNNLS.2021.3059434. Epub 2022 Aug 31.
6
In-line rate encrypted links using pre-shared post-quantum keys and DPUs.使用预共享量子后密钥和数据处理单元的内联速率加密链路。
Sci Rep. 2024 Sep 11;14(1):21227. doi: 10.1038/s41598-024-71861-x.
7
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications.一种用于智能电表数据通信的后量子密码学方案的片上系统实现。
Sensors (Basel). 2022 Sep 23;22(19):7214. doi: 10.3390/s22197214.
8
Meeting the security requirements of electronic medical records in the ERA of high-speed computing.在高速计算时代满足电子病历的安全要求。
J Med Syst. 2015 Jan;39(1):165. doi: 10.1007/s10916-014-0165-3. Epub 2014 Dec 7.
9
Quantum Misuse Attack on Frodo.对弗罗多的量子滥用攻击。
Entropy (Basel). 2022 Oct 4;24(10):1418. doi: 10.3390/e24101418.
10
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.用于物联网应用的后量子密码系统的比较研究
Sensors (Basel). 2022 Jan 9;22(2):489. doi: 10.3390/s22020489.

引用本文的文献

1
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure.一种基于改进型带误差学习(LWE)结构的标量整数上的后量子公钥签密方案。
Sensors (Basel). 2025 Jul 31;25(15):4728. doi: 10.3390/s25154728.
2
Length-Weight Distribution of Non-Zero Elements in Randomized Bit Sequences.随机比特序列中非零元素的长度-重量分布
Sensors (Basel). 2025 Jun 19;25(12):3825. doi: 10.3390/s25123825.

本文引用的文献

1
Quantum supremacy using a programmable superconducting processor.用量子计算优越性使用可编程超导处理器。
Nature. 2019 Oct;574(7779):505-510. doi: 10.1038/s41586-019-1666-5. Epub 2019 Oct 23.