期刊文献+

公钥加密体制选择密文安全性的灰盒分析

Gray-box analysis of chosen ciphertext security for public key encryption scheme
下载PDF
导出
摘要 为了更简单准确地判断公钥加密方案的IND-CCA2安全性,提出了IND-CCA2安全性的灰盒分析法。该方法对解密服务产生的信息泄露进行了详细完备的分解,然后通过分析每一类信息泄露的可能性来判定方案的IND-CCA2安全性。与IND-CCA2安全性的规约证明相比,灰盒分析更加简单容易理解,更适合作为公钥加密体制IND-CCA2安全性的评测方法。最重要的是,灰盒分析的信息泄露分析不仅可以判定公钥加密体制的IND-CCA2安全性,还可以发现方案不安全的原因,为方案的设计提供依据和指导。 To evaluate the IND-CCA2 security of public key encryption schemes, proposed the gray-box analysis of IND-CCA2 security. In the new method, evaluated the IND-CCA2 security by careful catalog and analysis of the information leak of decryption oracle. Compared with the reduction proof, gray-box analysis was more simple and easy to understand, and more suitable to be used as an evaluation method of the public key encryption scheme' s IND-CCA2 security. Most importantly, the analysis of the decryption oracle' s information leak not only can evaluate the IND-CCA2 security of a scheme, but also can find the reason of insecurity. This provides direction information for the design of IND-CCA2 schemes.
出处 《计算机应用研究》 CSCD 北大核心 2009年第11期4270-4273,4285,共5页 Application Research of Computers
基金 成都市2007年科技攻关项目(07GGYB050GX)
关键词 公钥加密体制 可证明安全性 适应性选择密文攻击 灰盒分析 public key encryption provable security adaptive chosen ciphertext attacks gray-box analysis
  • 相关文献

参考文献25

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Trans On Information Theory,1976,22(6) :644-654.
  • 2NAOR M,YUNG M. Public-key eryptosystems provably secure against chosen ciphertext attackS[ C ]//Proc of the 22nd Annual ACM Symposium on Theory of Computing. 1990:427-437.
  • 3BELLARE M, ROGAWAY P. Optimal asymmetric encryption[ C]// Proc of Advances in Cryptology--EUROCRYPT' 94. 1994:92-111.
  • 4SHOUP V. OAEP reconsidered [ C ]//Proc of CRYPTO' 01. 2001 :239-259.
  • 5HERZBERG A,SHULMAN H ,SAXENA A,et al. Towards a theory of white-box security [ EB/OL]. ( 2008- 08- 07 ). http://eprint. iacr. org/.
  • 6THOMPSON W. Cryptomorphic programming: a random program concept [ D ]. Florida: Dept Advanced Cryptography, Florida State University, 2005.
  • 7BELLARE M, ROGAWAY P. Random oracles arc practical: a paradigm for designing e_cient protocols[ C]//Proc of the 1st ACM Conference on Computer and Communications Security. 1993:62-73.
  • 8FUJISAKI E, OKAMOTO T. How to enhance the security of publickey encryption at minimum cost[ C]//Proc of Public Key Cryptography' 99. 1999:53-68.
  • 9POINTCHEVAL D. Chosen-ciphertext secudty for any one-way cryptosystem[ C]//Proc of Practice and Theory in Public Key Cryptography 2000. Berlin : Springer-Verlag, 2000:129-146.
  • 10OKAMOTO T, POINTCHEVAL D. REACT: rapid enhanced-security asymmetric cryp-tosystem transform[ C ]//Proc of Topics in Cryptology CT-RSA 2001. Berlin : Springer-Verlag, 2001 : 159-175.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部