期刊文献+

公钥加密体制自动化安全性证明方法研究

Research on Automated Security Proof of Public-Key Encryption Scheme
下载PDF
导出
摘要 可证明安全是目前分析密码协议安全性的一种重要方法,但是手工证明的难度较大,正确性也难以保证。利用计算机技术实现可证明安全性的自动化分析是目前的一个研究热点。文章在前人工作的基础上,设计了一个适用于更多密码协议的安全性证明的自动化证明工具。着重介绍了利用高级描述语言来描述的输入文件即"初始攻击游戏"的结构,并以带Hash的E lGamal加密体制为例,利用证明工具,实现了其安全性的自动化证明。 Provable security is one of important techniques for analyzing the security of cryptographic protocols,while manual proof is difficult and hard to estimate.Automatic proof with the help of computers is a hotspot now.This paper designs a tool which can satisfy much more cryptographic protocols for the automatic proof.It also introduces the framework of the initial attack game and gaves an example.By using the pioposed tool,the semantic security of the hashed version of ElGamal encryption scheme is proved.
出处 《信息工程大学学报》 2010年第4期472-476,492,共6页 Journal of Information Engineering University
基金 国家863计划资助项目(2007AA01Z471)
关键词 可证明安全 自动化 攻击游戏 ElGamal加密体制 provable security automatic attack game ElGamal encryption scheme
  • 相关文献

参考文献9

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2Bellare M,Rogaway P.Optimal asymmetric encryption-how to encrypt with RSA[C]∥Advances in Cryptology-EUROCRYPT'94.1994,950:92-111.
  • 3Nechaev V I.Complexity of a determinate algorithm for the discrete logarithm[J].Mathematical Notes 55,1994(2):165-172.
  • 4Shoup V.Sequences of Games:a tool for taming complexity in security proofs[C]∥Cryptology eprint Archive.2004:332-336.
  • 5Bathe G,Jan Cederquist and Sabrina Tarento.A Machine-checked Formalization of the Generic Model and the Random Oracle Model[J].Lecture Notes in Computer Science,2004,3097:385-399.
  • 6Halevi S.A plausible approach to computer-aided cryptographic proofs[EB/OL].[2005-08-11].Cryptology ePrint Archive,Report2005/181,http://eprint.iacr.org/.
  • 7Affeldt R,Tanaka M,Marti N.Formal Proof of Provable Security by Game-playing in a Proof Assistant[C]∥Provsec 2007.2007:151-168.
  • 8Blanchet B.Crypto Verif:A computationally sound mechanized prover for security protocols[R].Shloss Dagstuhl Seminar "Formal Protocol Verification Applied" Wadern,Germany,2007.
  • 9Goldwasser S,Micali S.Probabilistic encryption and how to play mental poker keeping secret all partial information[C]∥STOC.1982:365-377.

二级参考文献32

  • 1Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 2Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 3Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 4Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 5Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 6Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.
  • 7Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536.
  • 8Burrows M, Abadi M, Needham R. A logic for authentication. ACM Trans. on Computer Systems, 1990,8(1):18-36.
  • 9Bellare M, Rogaway P. Entity authentication and key exchange. In: Stinson D.R, ed. Proc. of the Advances in CryptologyCrypto'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993. 232-249.
  • 10Bellare M. Provably secure session key distribution-The three party case. In: Proc. of the ACM Symp. on the Theory of Computing. New York: ACM Press, 1995.57-66. http:∥doi.acm.org/10.1145/225058.225084.

共引文献101

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部