Common use of Other Applicable Post-Quantum Schemes and Future Work Clause in Contracts

Other Applicable Post-Quantum Schemes and Future Work. The proposed k-instances model applies to key agreement schemes in which the resulting shared secret is dependent on input from both parties (not encapsula- tion methods) where the use of static keys may reveal private keys to a malicious participant. We have seen that this applies to SIDH [13], but it may also apply to lattice based schemes. The ring-LWE key agreement protocol by ▇▇▇▇ et al. [16] satisfies this criterion as it is susceptible to such an active attack [11]. However, one would have to show that this protocol is irreducible (Definition 3). The computational costs of k-SIDH are naively k2 that of standard SIDH, in which parties simply perform k2 independent SIDH operations. Economies of scale could be realized in an optimized implementation using (for example) SIMD, since the key establishments can be organized into k groups of k such that all SIDH operations in a group have one half in common.

Appears in 1 contract

Sources: Key Agreement Protocol

Other Applicable Post-Quantum Schemes and Future Work. The proposed k-instances model applies to key agreement schemes in which the resulting shared secret is dependent on input from both parties (not encapsula- tion methods) where the use of static keys may reveal private keys to a malicious participant. We have seen that this applies to SIDH [13], but it may also apply to lattice based schemes. The ring-LWE key agreement protocol by ▇▇▇▇ Ding et al. [16] satisfies this criterion as it is susceptible to such an active attack [11]. However, one would have to show that this protocol is irreducible (Definition 3). The computational costs of k-SIDH are naively k2 that of standard SIDH, in which parties simply perform k2 independent SIDH operations. Economies of scale could be realized in an optimized implementation using (for example) SIMD, since the key establishments can be organized into k groups of k such that all SIDH operations in a group have one half in common.

Appears in 1 contract

Sources: Key Agreement Protocol