期刊文献+

一种新的可实现安全公钥密码体制——4次同余方程的应用

A Novel Security-Ensured Public Key Cryptosystem——A Quartic Congruential Equation Approach
下载PDF
导出
摘要 提出了一种新的、可实现安全的公钥密码体制,在采用原有的公钥、私钥的基础上,增加数量庞大、开销极低的公开参数集合;在每加密一批数据时选择一组新的不重复公开参数。提出了判断4次同余方程解结构及其求解的线性时间快速算法,以实现公开参数集合的操作。该安全方案可以主动抵御选择明文攻击与各种选择密文攻击,包括IND-CCA2,并且可以达到类似一次一密的安全效果。对于大批量数据的加密解密,计算和存储开销集中于第一个数据,自第二个之后只需要简单的异或操作;可应用于如RFID标签的低端产品或如无线网络等计算、存储、带宽等资源受到极大限制的设备中。 For improving the efficiency and the potential for actively protecting against attacks, a novel security-ensured public key cryptosystem is proposed. The idea is that a large set of published parameters, which are generated with almost no more overheads, is taken into account in addition to the original public and private keys. A new set of published parameters will be chosen when a group of data to be encrypted each time. The linear time quick algorithms for deciding the solution structure and computing the solution of the quartic congruential equations are proposed for implementing the operations on the published parameters. This cryptosystem can actively protect against the chosen plaintext and the various chosen ciphertext attacks including IND-CCA2 attacks. It achieves the same security like One-Time-Pad. For the repeated encryption/decryption for a set of data the requirements for computation and memory size are deeply decreased because only a series of XOR operations are needed after first data item has been encrypted/decrypted. Due to this reason, this cryptosystem may be used in very low-end devices, such as RFID tags, sensor networks, where the computation, memory and bandwidth are very limited.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期1147-1151,共5页 Journal of University of Electronic Science and Technology of China
基金 广东省自然科学基金(7003624)
关键词 选择密文攻击 信息安全 一次一密 4次同余方程 快速算法 chosen ciphertext attack information security one-time-pad quartic congruential equation quick algorithm
  • 相关文献

参考文献11

  • 1陈原,王育民,肖国镇.公钥密码体制与选择密文安全性[J].西安电子科技大学学报,2004,31(1):135-139. 被引量:11
  • 2王泽辉.一类椭圆曲线求阶O((10g2p)^3)时间算法及应用[C]∥密码学进展-CHINACRYPT’2006.北京:中国科学技术出版社,2006:67-74.
  • 3WANG Ze-hui, ZHANG Zhi-guo. XTR+: A provable secure public key cryptosystem[C]//Proc of the 2006 International Conference on CIS. Berlin: Springer-Verlag, 2007, LNAI 4456: 534-544.
  • 4CRAMER R, SHOUP V, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J]. SLAM Journal of Computing, 2003, 33: 167-226.
  • 5冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 6JUELS A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7BONO S, GREEN M, STUBBLEFIELD A, et al, Security analysis of a cryptographically-enabled RFID device[C]//In Proc 14th USENIX Security Symp. Baltimore: USENIX Association, 2005: 1-16.
  • 8王泽辉 方小洵.增加多媒体隐藏信息量的高效算法.哈尔滨工业大学学报,2006,3:710-714.
  • 9王泽辉.基于3次同余方程的概率公钥密码体制.通信学报,2006,27(12):61-65.
  • 10秦志光,张险峰,周世杰,刘锦德.基于ECC的门限数字签名方案及其安全性[J].电子科技大学学报,2005,34(1):109-112. 被引量:9

二级参考文献63

  • 1[1]Schnackenberg D, Holliday H, Smith R, et al. Cooperative Intrusion Traceback and Response Architecture (CITRA)[C]. In: Proceedings of the DARPA Information Survivability Conference and Exposition, Anaheim, 2001
  • 2[2]Schnackenberg D, Djahandari K, Sterne D. Infrastructure for intrusion detection and response[C]. In: Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, 2000
  • 3[3]Dipankar D, Fabio A G. An intelligent decision support system for intrusion detection and response[C]. Lecture Notes, Petersburg, 2001
  • 4[4]Savage S, Wetherall D, Karilin A, et al. Practical network support for IP tracebak[C]. Proceedings of the 2000 ACM SIGCOMM Conference, Stockholm, 2000
  • 5[5]Zhou Shijie, Qin Zhiguang, Lu Qin, et al. CI2D&R:Cost-based intelligent intrusion detection and response system[C]. In: Proceeiing of 2002 5th International Conference on Algorithms and Architectures for Parallel Processing, Beijing,2002
  • 6[6]Domingos P. MetaCost: a general method for making classifiers cost-sensitive[EB/OL]. http:∥www. gia.ist.utl.pt/~pedrod, 1999-08-05
  • 7[7]Wenke Lee. Toward cost-sensitive modeling for intrusion detection and response[J]. Journal of Computer Security,2000, 10(1): 5-22
  • 8Crammer R, Shoup V. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-key Eneryption[DB/OL].http ://iacr. org/2001/085. ps.2001.
  • 9Elkind E, Schai A. A Unified Methodology for Constructing Public-key Encryption Schemes Secure Against Adaptive Chosen-ciphertext Attack[ DB/OL ]. http://iacr. org/2002/042. ps. gz. 2002-10-16.
  • 10Goldwasser S, Micali S. Probabilistic Encryption[J]. Computer and System Sciences, 1984, 28(2) : 270-299.

共引文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部