Skip to main content
Log in

Securing Post-Quantum Resistance for Quantum-Protected Communication Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Methodology for protecting the systems of quantum-protected communication based on postquantum crypto-algorithm usage at all stages of operation is presented. Authenticated encryption and postquantum signcryption makes it possible to reduce the number of keys in a quantum-protected system and to increase the number of interacting devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.

Similar content being viewed by others

REFERENCES

  1. Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.

  2. Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.

    Article  Google Scholar 

  3. Aleksandrova, E.B., Shtyrkina, A.A., and Iarmak, A.V., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 269–276.

  4. Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.

    Article  Google Scholar 

  5. Arute, F., et al., Quantum supremacy using a programmable superconducting processor, Nature, 2019, vol. 574, pp. 505–510.

    Article  Google Scholar 

  6. Li, F., et al., Lattice-based signcryption, Concurrency Comput.: Pract. Exper., 2013, vol. 25, no. 14, pp. 2112–2122.

    Article  Google Scholar 

  7. Wang, X., et al., An identity-based signcryption on lattice without trapdoor, J. UCS, 2019, vol. 25, no. 3, pp. 282–293.

    MathSciNet  Google Scholar 

  8. Han, Y., et al., New multivariate-based certificateless hybrid signcryption scheme for multi-recipient, Wuhan Univ. J. Nat. Sci., 2014, vol. 19, no. 5, pp. 433–440.

    Article  MathSciNet  Google Scholar 

  9. McGrew, D. and Viega, J., The Galois/Counter Mode of Operation (GCM), Submission to NIST Modes of Operation Process, 2004.

    MATH  Google Scholar 

  10. Nozdrunov, V., Parallel and double block cipher mode of operation (PD-mode) for authenticated encryption, CTCrypt 2017, 2017.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to E. N. Shkorkina or E. B. Aleksandrova.

Ethics declarations

The authors declare that they have no conflicts of interest.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shkorkina, E.N., Aleksandrova, E.B. Securing Post-Quantum Resistance for Quantum-Protected Communication Systems. Aut. Control Comp. Sci. 54, 949–951 (2020). https://doi.org/10.3103/S0146411620080301

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080301

Keywords:

Navigation