Page 46 - 《软件学报》2025年第10期
P. 46

米瑞琪 等: 基于   Kyber 公钥加密的高效认证密钥交换协议                                               4443


                     Proc. of the 19th Int’l Conf. on Emerging Networking Experiments and Technologies. Paris: ACM, 2023. 19–27. [doi: 10.1145/3624354.
                     3630585]
                 [14]   Schwabe  P,  Stebila  D,  Wiggers  T.  Post-quantum  TLS  without  handshake  signatures.  In:  Proc.  of  the  2020  ACM  SIGSAC  Conf.  on
                     Computer and Communications Security. ACM, 2020. 1461–1480. [doi: 10.1145/3372297.3423350]
                 [15]   Donenfeld JA. WireGuard: Next generation kernel network tunnel. In: Proc. of the 24th Annual Network and Distributed System Security
                     Symp. San Diego: The Internet Society, 2017. [doi: 10.14722/ndss.2017.23160]
                 [16]   Li ZC, Xie T, Zhang JM, Xu RH. Post quantum authenticated key exchange protocol based on ring learning with errors problem. Journal
                     of Computer Research and Development, 2019, 56(12): 2694–2701. (in Chinese with English abstract) [doi: 10.7544/issn1000-1239.2019.
                     20180874]
                 [17]   Xue HY, Lu XH, Li B, Liang B, He JN. Understanding and constructing AKE via double-key key encapsulation mechanism. In: Proc. of
                     the 24th Int’l Conf. on the Theory and Application of Cryptology and Information Security. Brisbane: Springer, 2018. 158–189. [doi: 10.
                     1007/978-3-030-03329-3_6]
                 [18]   Hövelmanns K, Kiltz E, Schäge S, Unruh D. Generic authenticated key exchange in the quantum random oracle model. In: Proc. of the
                     23rd IACR Int’l Conf. on Practice and Theory of Public-key Cryptography. Edinburgh: Springer, 2020. 389–422. [doi: 10.1007/978-3-
                     030-45388-6_14]
                 [19]   Rescorla E, Modadugu N. Datagram transport layer security version 1.2. RFC 6347. 2012.
                 [20]   Kaufman C, Hoffman P, Nir Y, Eronen P. Internet key exchange protocol version 2. RFC 5996. 2010.
                 [21]   Aumasson JP, Neves S, Wilcox-O’Hearn Z, Winnerlein C. BLAKE2: Simpler, smaller, fast as MD5. In: Proc. of the 11th Int’l Conf. on
                     Applied Cryptography and Network Security. Banff: Springer, 2013. 119–135. [doi: 10.1007/978-3-642-38980-1_8]
                 [22]   Nir Y, Langley A. ChaCha20 and Poly1305 for IETF protocols. IETF RFC 8439, 2018. [doi: 10.17487/RFC8439]

                 附中文参考文献:
                 [16]   李子臣, 谢婷, 张卷美, 徐荣华. 基于  RLWE  的后量子认证密钥交换协议. 计算机研究与发展, 2019, 56(12): 2694–2701. [doi:
                     10.7544/issn1000-1239.2019.20180874]


                             米瑞琪(1995-), 女, 博士生, 主要研究领域为后                 张振峰(1972-), 男, 博士, 研究员, 博士生导师,
                            量子密码的设计与分析.                                  主要研究领域为密码学与数据安全.




                             江浩东(1989-), 男, 博士, 主要研究领域为抗量
                            子密码研究, 量子可证明安全理论, 格密码学设
                            计与分析, 量子算法与量子查询复杂度理论.
   41   42   43   44   45   46   47   48   49   50   51