期刊文献+

单双钥混合体制的选择密文安全性

Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption
下载PDF
导出
摘要 该文主要讨论单双钥混合体制的选择密文安全性IND-CCA的定义和相关结论。在对两种不同用途的单双 钥混合体制及其安全性的研究之后发现它们的IND-CCA定义中允许敌手访问的预言机不同,我们将其统一为:对 只能询问混合体制整体解密机的敌手的安全性,从而统一了混合体制的安全结论,为正确使用混合体制提供了依据。 我们提出了一种混合体制:REACT+,并证明了其IND-CCA安全性。 The definition and related conclusions of chosen ciphertext security IND-CCA (INDistinguishability against adaptive-Chosen Ciphertext Attack) of hybrid encryption of symmetric and asymmetric encryption are discussed. Having studied two kinds of hybrid encryptions of different use and their security definitions, it is found that there is a difference in the oracles. Then the definition of IND-CCA is unified as security for the adversaries can only access the whole decryption oracle of hybrid schemes, which makes the unification of security conclusions of hybrid schemes possible, and supplies the ground for proper use of hybrid schemes. A hybrid scheme called REACT+ has been proposed with its security proof.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第4期612-616,共5页 Journal of Electronics & Information Technology
基金 国家部级基金(41001040102)资助课题
关键词 混合体制 选择密文安全性 密码学 Hybrid scheme, Chosen ciphertext security, Cryptology
  • 相关文献

参考文献9

  • 1Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem.Cachin C, Camenisch J eds. Advances in Cryptology - Eurocrypt 2004 Proceedings. Berlin: Springer-Verlag, 2004, LNCS Vol.3027: 171- 188.
  • 2Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform. Advances in Cryptology-Crypto'2001. Berlin: Springer Verlag, 2001, LNCS Vol.2020:159- 175.
  • 3Bellare M, Desai A, D. Pointcheval, et al. Relations among notions of security for public-key encryption schemes. Advancesin Cryptology-Crypt'98. Berlin: Springer-Verlag, 1998, LNCSVol.1462:26 - 45.
  • 4Bellare M, Sahai A, Jokipii E, et al. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, Miami Beach, Florida, 1997:394 - 403.
  • 5Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encrption scheme. Advances in Cryptology-Crypto'99. Berlin: Springer Verlag, 1999, LNCS Vol.1666:537 - 554.
  • 6Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First Annual Conference on Computer and Communications Security, NewYork, ACM, 1993:62 - 73.
  • 7Bellare M, Rogaway P. Optimal asymmetric encryption: How to encrypt with RSA. Advances in Cryptology-Eurocrpt'94. Berlin:Springer Verlag, 1994, LNCS Vol. 950:92 - 111.
  • 8Crammer R, Shoup V. A pratical public key cryptosystem provably secure against adaptive chosen ciphertext attack. H.Krawczyk ed. Advances in Cryptology-Crypto'98 Proceedings,Berlin: Springer Verlag, 1998, LNCS Vol. 1462:13 - 25.
  • 9Elkind E, Sahai A. A unified methodology for constructing public-key encryption schemes secure against adaptive chosen-ciphertext attack, available at iacr.org/2002/042.ps.gz.2002.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部