PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme

Abel C. H. Chen
2024-01-03
Abstract:In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme has found application in security credential management systems (SCMS) and secure vehicle-to-everything (V2X) communication to issue pseudonymous certificates. However, the vulnerability of elliptic-curve cryptography (ECC) to polynomial-time attacks posed by quantum computing raises concerns. In order to enhance resistance against quantum computing threats, various post-quantum cryptography methods have been adopted as standard (e.g. Dilithium) or candidate standard methods (e.g. McEliece cryptography), but state of the art has proven to be challenging to implement implicit certificates using lattice-based cryptography methods. Therefore, this study proposes a post-quantum cryptography McEliece-Chen (PQCMC) based on an efficient random invertible matrix generation method to issue pseudonymous certificates with less computation time. The study provides mathematical models to validate the key expansion process for implicit certificates. Furthermore, comprehensive security evaluations and discussions are conducted to demonstrate that distinct implicit certificates can be linked to the same end entity. In experiments, a comparison is conducted between the certificate length and computation time to evaluate the performance of the proposed PQCMC. This study demonstrates the viability of the implicit certificate scheme based on PQC as a means of countering quantum computing threats.
Cryptography and Security,Networking and Internet Architecture
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is the vulnerability of existing elliptic curve implicit certificate schemes (such as ECQV) under the threat of quantum computing. Specifically: 1. **Threat of quantum computing**: With the development of quantum computing, Shor's algorithm makes mainstream asymmetric encryption technologies (such as RSA and elliptic curve cryptography ECC) vulnerable to polynomial - time attacks. This has raised security concerns about the current security credential management systems (SCMS) and the implicit certificate schemes used in vehicle - to - everything (V2X) communications. 2. **Challenges in implicit certificate generation**: Although some post - quantum cryptography (PQC) methods have been proposed or standardized (such as Dilithium), it is still challenging to implement implicit certificates in lattice - based cryptography methods. To solve these problems, the paper proposes a post - quantum implicit certificate scheme (PQCMC) based on McEliece cryptography. The main contributions of this scheme include: - **Providing pseudo - anonymous certificates**: The PQCMC scheme can provide pseudo - anonymous certificates without using signatures, thereby enhancing privacy protection. - **Mathematical model verification**: A mathematical model is given to verify the key expansion process of implicit certificates. - **Efficient generation of random invertible matrices**: An efficient method with a time complexity of O(n) is proposed to generate random invertible matrices, thereby reducing the computation time. Through these improvements, PQCMC aims to improve the security of implicit certificate schemes under the threat of quantum computing and provide stronger security guarantees for future SCMS and V2X communications. ### Formula summary 1. **Elliptic curve equation**: \[ y^{2}=x^{3}+\alpha x + \beta\ (\text{mod}\ n) \] 2. **ECDSA signature generation formula**: \[ s=\left[\frac{h + ax_{R}}{r}\right]\ (\text{mod}\ n) \] 3. **ECDSA signature verification formula**: \[ Z = uG + vA=(u + va)G \] where, \[ u=\frac{h}{s},\quad v=\frac{x_{R}}{s} \] 4. **McEliece encryption formula**: \[ e(m, L)=mK_{1}K_{2}K_{3}+r = z \] 5. **McEliece decryption formula**: \[ d(z,\{K_{1},K_{2},K_{3}\})=f(zK_{3}^{-1})K_{4}K_{1}^{-1}=m \] 6. **PQCMC private key update formula**: \[ q = \{M_{h}L(CA)^{T}K_{1}^{(E)},K_{2}^{(E)},K_{3}^{(E)}\} \] 7. **PQCMC public key update formula**: \[ Q = M_{h}L(CA)B \] 8. **Random invertible matrix generation algorithm**: This algorithm has a time complexity of O(n) and is used to generate random invertible matrices. Through these improvements, the PQCMC scheme not only improves the security and efficiency of implicit certificates but also provides a solid foundation for the future post - quantum era.