期刊文献+

可证明安全性理论与方法研究 被引量:101

Research on Theory and Approach of Provable Security
下载PDF
导出
摘要 论述了可证明安全性理论在安全方案与安全协议的设计与分析中的应用,内容主要包括:什么是可证明安全性,可证明安全性理论涉及到的一些基本概念,RO(randomoracle)模型方法论的基本思想及其在公钥加密和数字签名等方案中的应用研究进展,标准模型下可证明安全性理论在公钥加密和数字签名等方案中的应用研究进展,以及可证明安全性理论在会话密钥分配协议的设计与分析中的应用研究进展. This paper presents a survey on the theory ot provatble security and its appncauons to me design and analysis of security protocols. It clarifies what the provable security is, explains some basic notions involved in the theory of provable security and illustrates the basic idea of random oracle model. It also reviews the development and advances of provably secure public-key encryption and digital signature schemes, in the random oracle model or the standard model, as well as the applications of provable security to the design and analysis of session-key distribution protocols and their advances.
作者 冯登国
出处 《软件学报》 EI CSCD 北大核心 2005年第10期1743-1756,共14页 Journal of Software
基金 国家重点基础研究发展规划(973) 国家自然科学基金~~
关键词 可证明安全性 密码方案 安全协议 RO(random oracle)模型 标准模型 provable security cryptosystem security protocol random oracle model standard model
  • 相关文献

参考文献32

  • 1Bellare M. Practice-Oriented provable-security. In: Damgard I, ed. Modem Cryptology in Theory and Practice. LNCS 1561, Berlin,Heidelberg: Springer-Verlag, 1999. 1-15.
  • 2Goldreich O. Foundations of Cryptography. Cambridge: Cambridge University Press, 2001.
  • 3Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Science, 1984,28:270-299.
  • 4Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 1988,17(2):281-308.
  • 5Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of the 1st ACM Conf.on Computer and Communications Security. New York: ACM Press, 1993.62-67. http:∥doi.acm.org/10.1145/168588.168596.
  • 6Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited. Journal of the ACM, 2004,51(4):557-594.
  • 7Pointcheval D. Asymmetric cryptography and practical security. Journal of Telecommunications and Information Technology, 2002,4:41-56.
  • 8Bellare M, Bilian J, Rogaway P. The security of cipher block chaining. In: Desmedt Y, ed. Proc. of the Advances in CryptologyCrypto'94. LNCS 839, Berlin, Heidelberg: Springer-Verlag, 1994. 341-358.
  • 9Bellare M, Rogaway P. Optimal asymmetric encryption. In: Santis A.D, ed. Proc. of the Advances in CryptologyEUROCRYPT'94. LNCS 950, Berlin, Heidelberg: Springer-Verlag, 1995.92-111.
  • 10Bellare M, Rogaway P. The exact security of digital signatures-How to sign with RSA and rabin. In: Maurer U, ed. Proc. of the Advances in Cryptology-Eurocrypt'96 Proc. LNCS 1070, Berlin, Heidelberg: Springer-Verlag, 1996. 399-416.

同被引文献927

引证文献101

二级引证文献483

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部