报告题目:Candidates for Post-Quantum Cryptography with an Emphasis on Code based Systems
报 告 人:Professor Joachim Rosenthal
主 持 人:沈佳辰 博士
报告时间:2018年7月23日 周一10:00-11:00
报告地点:中北校区数学馆201室
报告人简介:
Joachim Rosenthal is Professor of Applied Mathematics in the Department of Mathematics at the University of Zürich. From 2011-2013 he served as Chair of the Mathematics Department and from 2016-2020 he has been Vice Dean of the College of Science. He received the Diploma in Mathematics from the University of Basel in 1986 and the Ph.D. in Mathematics from Arizona State University in 1990.
His current research interests are in coding theory and cryptography. In coding theory he is interested in convolutional codes, LDPC codes and more general codes on graphs. In cryptography his main interest lies in the area of postquantum cryptography, in particular in the area of code based cryptography. He serves currently on the editorial board of SIAM Journal on Applied Algebra and Geometry (SIAGA), Advances in Mathematics of Communications (AMC), Journal of Algebra and Its Applications (JAA), Journal of Algebra Combinatorics Discrete Structures and Applications, International Journal of Information and Coding Theory (IJOCT).
Since 2004 he has been one of the two moderators (with Madhu Sudan) of the Information theory section of arXiv. In August 2002 he served as the Symposium Chair of the International Symposium on Mathematical Theory of Networks and Systems (MTNS).
报告摘要:
With the realization that a quantum computer would make many practically used public key cryptographic systems obsolete (compare with the reports~/cite{nist15,nist16}) it became an important research topic to design public key systems which are expected to be secure even if a powerful quantum computer would exist.
In the talk we will explain about the major possible candidates for post-quantum cryptography and we will then concentrate on so called code based systems which were first proposed in 1978 by Robert McEliece who demonstrated how the hardness of decoding a general linear code up to half the minimum distance can be used as the basis for a public key crypto system.
[1] Use of Public Standards for the Secure sharing of Information Among National Security Systems. Technical report, Committee on National Security Systems, July 2015. CNSS Advisory Memorandum.
[2] Report on Post-Quantum Cryptography. Technical report, National Institute of Standards and Technology, February 2016. NISTIR 8105.