标准号:IEEE 1363.1-2008
中文标准名称:基于点阵上疑难问题的公钥加密技术用规范
英文标准名称:Specification for public key cryptographic techniques based on hard problems over lattices
标准类型:L80
发布日期:1999/12/31 12:00:00
实施日期:1999/12/31 12:00:00
中国标准分类号:L80
国际标准分类号:35.040
引用标准:FIPS 180
适用范围:This standard provides specifications of common public key cryptographic techniques based on hardproblems over lattices supplemental to those considered in IEEE Std 1363™-2000 [B47]1 and IEEE Std1363a™-2004 [B48], including mathematical primitives for secret value (key) derivation, public keyencryption, identification and digital signatures, and cryptographic schemes based on those primitives.Specifications of related cryptographic parameters, public keys, and private keys are also presented. Classof computer and communications systems is not restricted.The transition from paper to electronic media brings with it the need for electronic privacy and authenticity.Public key cryptography offers fundamental technology addressing this need. Many alternative public keytechniques have been proposed, each with its own benefits. IEEE Std 1363-2000 [B47] and IEEE Std1363a-2004 [B48] have produced a comprehensive reference defining a range of common public key techniques covering key agreement, public key encryption, and digital signatures from several families,namely the discrete logarithm, integer factorization, and elliptic curve families.This standard specifies cryptographic techniques based on hard problems over lattices. These techniquesmay offer tradeoffs in operating characteristics when compared with the methods already specified in IEEE1363-2000 and IEEE Std 1363a-2004. This standard also provides a second-generation framework for thedescription of cryptographic techniques, as compared to the initial framework provided in IEEE Std 1363-2000 and IEEE Std 1363a-2004.It is not the purpose of this project to mandate any particular set of public key techniques or securityrequirements (including key sizes) for this or any family. Rather, the purpose of this standard is to providethe following:a) A reference for specification of a variety of techniques from which applications may selectb) The relevant number-theoretic backgroundc) Extensive discussion of security and implementation considerations so that a solution provider canchoose appropriate security requirements for itself