抗量子公钥密码技术的现状、挑战与应对
Research Status, Challenges, and Future Development of Post-Quantum Cryptography
密码作为保障国家信息安全、数字经济健康发展的核心战略资源,是维护关键基础设施、政务数据、金融交易等领域安全的核心防线。当前,量子计算技术快速发展对现有公钥密码体系带来颠覆性挑战,对全球信息安全格局构成致命威胁,开展抗量子公钥密码技术的研究与部署必要且紧迫。本文详细阐述了抗量子公钥密码中格、编码、杂凑签名、多量、同源5条主流技术路线的发展现状,并发现5条技术路线各有侧重但都处于持续迭代与验证阶段。研究发现,抗量子公钥密码技术发展存在的主要问题包括性能瓶颈、生态兼容性差以及安全评估困难等,我国抗量子公钥密码发展面临理论研究基础薄弱、标准制定滞后、产业生态不完善以及人才短缺等挑战。为保障我国在量子计算时代的信息安全,研究建议,加强基础研究、提升自主创新能力,加速标准制定、提升国际话语权,完善产业生态、推动抗量子分阶段迁移,强化人才培养,打造专业人才队伍,助力我国构建起多维度、强韧性的数字安全新生态,推动我国网络空间安全能力实现从经典安全向量子安全的能力跃升。
As an important strategic resource for safeguarding national information security and the healthy development of digital economy, cryptography is the cornerstone of protecting the security of critical infrastructure, government affairs data, financial transactions, and other fields. Currently, the rapid development of quantum computing poses a disruptive challenge to the existing public-key cryptosystems and a fatal threat to the global information security landscape, making research on post-quantum public-key cryptography (PQC) both necessary and urgent. This study expounds on the current development status of five mainstream technical routes in PQC: lattice-based, code-based, hash-based signature, multivariate, and isogeny-based cryptography, and finds that each of these five routes has its own focus yet is in a stage of continuous iteration and verification. The study identifies the existing issues of the development of PQC including performance bottlenecks, insufficient ecological compatibility, and difficulties in security evaluation. Meanwhile, the development of PQC in China is confronted with challenges such as a weak foundation in theoretical research, lagging standards formulation, an imperfect industrial ecosystem, and a shortage of professional talents. To safeguard China's information security in the quantum computing era, we propose the following suggestions: strengthening basic research to enhance the independent innovation capability of the industry; accelerating standards formulation to boost international discourse power; improving the industrial ecosystem to promote the phased migration to PQC; intensifying talent cultivation to build a professional talent team. These measures are expected to help China construct a multi-dimensional and highly resilient digital security ecosystem, and drive the leap-forward development of China's cyberspace security capability from classical to quantum security.
| [1] |
Shor P W. Algorithms for quantum computation: Discrete logarithms and factoring [R]. Santa Fe: The 35th Annual Symposium on Foundations of Computer Science, 2002. |
| [2] |
Gouzien É, Sangouard N. Factoring 2048-bit RSA integers in 177 days with 13436 qubits and a multimode memory [EB/OL]. (2021-03-10)[2025-05-12]. https://arxiv.org/abs/2103.06159. |
| [3] |
IBM quantum submit 2023 [EB/OL]. [2025-05-20]. https://www.ibm.com/quantum/summit-2023. |
| [4] |
Chevignard C, Fouque P A, Schrottenloher A. Reducing the number of qubits in quantum factoring [R]. Santa Barbara: The 45th Annual International Cryptology Conference, 2025. |
| [5] |
Roetteler M, Naehrig M, Krysta M S, et al. Quantum resource estimates for computing elliptic curve discrete logarithms [EB/OL]. (2017-06-21)[2025-05-08]. https://doi.org/10.48550/arXiv.1706.06752. |
| [6] |
Ajtai M. Generating hard instances of lattice problems (extended abstract) [R]. Philadelphia: STOC96: ACM Symposium on Theory of Computingx, 1996. |
| [7] |
Ajtai M, Dwork C. A public-key cryptosystem with worst-case/average-case equivalence [R]. El Paso:The Twenty-Ninth Annual ACM Symposium on Theory of Computing—STOC '97, 1997. |
| [8] |
Regev O. On lattices, learning with errors, random linear codes, and cryptography [R]. Baltimore: The Thirty-Seventh Annual ACM Symposium on Theory of Computing, 2005. |
| [9] |
Hoffstein J, Pipher J, Silverman J H. NTRU: A ring-based public key cryptosystem [R]. Portland: Third International Symposium, 1998. |
| [10] |
Ducas L, Lyubashevsky V, Prest T. Efficient identity-based encryption over NTRU lattices [R]. Kaoshiung: The 20th International Conference on the Theory and Application of Cryptology and Information Security, 2014. |
| [11] |
Prest T, Fouque P A, Hoffstein J, et al. Falcon [EB/OL]. [2025-08-20]. https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions. |
| [12] |
Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings [R]. French Riviera: The 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010. |
| [13] |
Schwabe P, Avanzi R, Bos J, et al. Crystals-kyber [EB/OL]. [2025-08-20]. https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions. |
| [14] |
Léo D, Tancrède L, Vadim L, et al. CRYSTALS—Dilithium: Digital signatures from module lattices [EB/OL]. [2025-08-20]. https://cryptojedi.org/papers/dilithium-20170627.pdf,2017. |
| [15] |
McEliece R. A public key cryptosystem based on algebraic coding theory [R]. Pasadena: California Institute of Technology, 1978. |
| [16] |
Niederreiter H. Knapsack-type cryptosystems and algebraic coding theory [J]. Problems of Control and Information Theory, 1986, 15(2): 159‒166. |
| [17] |
Aragon N, Barreto P, Bettaieb S, et al. Bike [EB/OL]. [2025-08-20]. https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions. |
| [18] |
Melchor C A, Aragon N, Bettaieb S, et al. HQC [EB/OL]. [2025-08-20]. https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions. |
| [19] |
Misoczki R, Tillich J P, Sendrier N, et al. MDPC-McEliece: New McEliece variants from moderate density parity-check codes [R]. Istambul: The 2013 IEEE International Symposium on Information Theory, 2013. |
| [20] |
Buchmann J, Dahmen E, Hülsing A. XMSS-a practical forward secure signature scheme based on minimal security assumptions [R]. Taipei: The 4th International Workshop, PQCrypto 2011, 2011. |
| [21] |
Bernstein D J, Hülsing A, Kölbl S, et al. The SPHINCS+ signature framework [R]. London: The 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019. |
| [22] |
Matsumoto T, Imai H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption [R]. Davos: Workshop on the Theory and Application of Cryptographic Techniques, 1988. |
| [23] |
Patarin J. Cryptanalysis of the matsumoto and imai public key scheme of eurocrypt’88 [R]. Santa Barbara: The 15th Annual International Cryptology Conference, 1995. |
| [24] |
Patarin J. The oil and vinegar signature scheme [R]. Dagstuhl: Dagstuhl Workshop on Cryptography, 1997. |
| [25] |
Ding J T, Schmidt D. Rainbow, a new multivariable polynomial signature scheme [R]. New York: Third International Conference, ACNS 2005, 2005. |
| [26] |
Tsujii S, Tadaki K, Fujita R. Piece in hand concept for enhancing the security of multivariate type public key cryptosystems: without containing all the information of secret key [EB/OL]. (2004-12-20)[2025-05-23]. https://eprint.iacr.org/2004/366. |
| [27] |
Beullens W, Campos F, Celi S, et al. MAYO specification document [EB/OL]. [2025-08-20]. https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/mayo-spec-web.pdf. |
| [28] |
Beullens W, Chen M S, Ding J T, et al. UOV: Unbalanced oil and vinegar: Algorithm specifications and supporting documentation version 1.0 [EB/OL]. [2025-08-20]. https://csrc.nist.gov/csrc/media/Projects/pqc-dig-sig/documents/round-1/spec-files/UOV-spec-web.pdf. |
| [29] |
Furue H, Ikematsu Y, Kiyomura Y, et al. A new variant of unbalanced oil and vinegar using quotient ring: QR-UOV [R]. Singapore: The 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021. |
| [30] |
Wang L C, Tseng P E, Kuan Y L, et al. A simple noncommutative UOV scheme [J]. IACR Cryptol EPrint Arch, 2022, 2022: 1742. |
| [31] |
Couveignes J W. Hard homogeneous spaces [EB/OL]. (2006-08-24)[2025-05-26]. https://eprint.iacr.org/2006/291.pdf. |
| [32] |
Childs A, Jao D, Soukharev V. Constructing elliptic curve isogenies in quantum subexponential time [J]. Journal of Mathematical Cryptology, 2014, 8(1): 1‒29. |
| [33] |
Castryck W, Lange T, Martindale C, et al. CSIDH: An efficient post-quantum commutative group action [R]. Brisbane: The 24th International Conference on the Theory and Application of Cryptology and Information Security, 2018. |
| [34] |
Moriya T, Onuki H, Takagi T. SiGamal: A supersingular isogeny-based PKE and its application to a PRF [R]. Daejeon: The 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020. |
| [35] |
Fouotsa T B, Petit C. SimS: A simplification of SiGamal [R]. Daejeon: The 12th International Workshop, PQCrypto 2021, 2021. |
| [36] |
Luca De F, Steven D G. Seasign: compact isogeny signatures from class group actions [R]. Darmstadt: The 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2019. |
| [37] |
Beullens W, Kleinjung T, Vercauteren F. CSI-FiSh: Efficient isogeny based signatures through class group computations [R]. Kobe: The 25th International Conference on the Theory and Application of Cryptology and Information Security, 2019. |
| [38] |
Colò L, Kohel D. Orienting supersingular isogeny graphs [J]. Journal of Mathematical Cryptology, 2020, 14(1): 414‒437. |
| [39] |
Onuki H. On oriented supersingular elliptic curves [J]. Finite Fields and Their Applications, 2021, 69: 101777. |
| [40] |
Jao D, De Feo L. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies [R]. Taipei: The 4th International Workshop, PQCrypto 2011, 2011. |
| [41] |
Jao D, Azarderakhsh R, Campagna M, et al. Supersingular isogeny key encapsulation [EB/OL]. [2025-08-20]. https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/SIKE-spec.pdf. |
| [42] |
Castryck W, Decru T. An efficient key recovery attack on SIDH (preliminary version) [J]. IACR Cryptol EPrint Arch, 2022, 2022: 975. |
| [43] |
Maino L, Martindale C. An attack on SIDH with arbitrary starting curve [EB/OL]. (2022-08-08)[2025-05-24]. https://eprint.iacr.org/2022/1026. |
| [44] |
Robert D. Breaking SIDH in polynomial time [R]. Cham: Advances in Cryptology—EUROCRYPT 2023, 2023. |
| [45] |
Deuring M. Die typen der multiplikatorenringe elliptischer funktionenkörper [J]. Abhandlungen Aus Dem Mathematischen Seminar der Universität Hamburg, 1941, 14(1): 197‒272. |
| [46] |
De Feo L, Kohel D, Leroux A, et al. SQISign: Compact post-quantum signatures from quaternions and isogenies [R]. Daejeon: The 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020. |
| [47] |
Dartois P, Leroux A, Robert D, et al. SQIsignHD: New dimensions in cryptography [R]. Zurich: The 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024. |
| [48] |
Nakagawa K, Onuki H. QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras [R]. Santa Barbara: The 44th Annual International Cryptology Conference, 2024. |
| [49] |
Basso A, Dartois P, De Feo L, et al. SQIsign2D-West:The fast, the small, and the safer [R]. Kolkata: The 30th International Conference on the Theory and Application of Cryptology and Information Security, 2024. |
| [50] |
Nakagawa K, Onuki H, Castryck W, et al. SQIsign2D-East: A new signature scheme using 2-dimensional isogenies [R]. Kolkata: The 30th International Conference on the Theory and Application of Cryptology and Information Security, 2024. |
| [51] |
Duparc M, Fouotsa T B. SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies [R]. Kolkata: The 30th International Conference on the Theory and Application of Cryptology and Information Security, 2024. |
| [52] |
Nguyen P Q, Vidick T. Sieve algorithms for the shortest vector problem are practical [J]. Journal of Mathematical Cryptology, 2008, 2(2): 181‒207. |
| [53] |
Becker A, Ducas L, Gama N, et al. New directions in nearest neighbor searching with applications to lattice sieving [R]. Arlington: SODA '16: Symposium on Discrete Algorithms, 2016. |
| [54] |
Chailloux A, Loyer J. Lattice sieving via quantum random walks [R]. Singapore: The 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021. |
| [55] |
Bonnetain X, Chailloux A, Schrottenloher A, et al. Finding many collisions via reusable quantum walks: Application to lattice sieving [R]. Lyon: The 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023. |
| [56] |
向宏, 胡希, 付皓玥. 美国标准与技术研究院后量子密码分析及制标工作研究 [M]. 北京: 电子工业出版社, 2025. |
| [57] |
Xiang H, Hu X, Fu H Y. Research on post-quantum cryptanalysis and standardization work at the National Institute of Standards and Technology (NIST) [M]. Beijing: Publishing House of Electronics Industry, 2025. |
中国工程院咨询项目“网络空间安全新技术新应用风险研究”(2023-JB-13)
/
| 〈 |
|
〉 |