期刊文献+

一种RMPKC体制的改进方案

An Improved RMPKC Scheme
下载PDF
导出
摘要 针对有理多变量公钥密码系统(RMPKC)曾被改进的2R分解算法成功攻破这一问题,文中提出了一种RMPKC体制的改进方案.该方案的核心思想是将第一个有理映射的函数次数变为三次,第二个有理映射的函数次数保持不变.文中证明了这种改进方法能够使得2R分解算法的条件不被满足,因此能够抵抗目前的2R分解算法;文中还证明了,当第二个有理映射的函数次数是三次、第一个有理映射的函数次数保持不变时,2R分解算法仍有效. As the rational multivariate public key cryptosystem(RMPKC) had been broken by an improved 2R decomposition method,this paper proposes an improved RMPKC scheme.In this scheme,the order of the function of the first rational mapping is changed to three while that of the second remains unchanged.Based on this core idea,the requirement for conducting the 2R decomposition attack is not fulfilled.Thus,the current 2R decomposition attack is effectively resisted by the improved RMPKC scheme.It is proved that the 2R decomposition attack is valid when the order of the function of the second rational mapping is changed to three while that of the first remains unchanged.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第11期135-140,共6页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"973"计划项目(2007CB311201) 国家自然科学基金资助项目(60970119 60803149)
关键词 密码学 公钥密码学 映射 多项式 合成 分解 cryptography public key cryptography mapping polynomial composition decomposition
  • 相关文献

参考文献8

  • 1Ding J,Gower J E,Schmidt D S.Multivariate public key cryptosystems[M].Berlin:Springer,2006:2-3.
  • 2李明祥,韩伯涛,朱建勇,郑雪峰,闫鹏.在标准模型下安全的基于身份的代理签名方案[J].华南理工大学学报(自然科学版),2009,37(5):118-122. 被引量:13
  • 3MU Ning-bo,HU Yu-pu,OU Hai-wen.Broadcast encryption schemes based on RSA[J].The Journal of China Universities of Posts and Telecommunications,2009,16(1):69-75. 被引量:2
  • 4Tsujii S,Fujioka A,Hirayama Y.Generalization of the public key cryptosystem based on the difficulty of solving a system of non-linear equations[J].IEICE Transactions (A),1989,72(2):390-397.
  • 5Tsujii S,Tadaki K,Fujita R.Piece in hand concept for enhancing the security of multivariate type public key cryp-tosystems:without containing all the information of secret key[EB/OL].[2004-12-16].http:∥eprint.iacr.org.
  • 6Ding J,Wagner J.Cryptanalysis of rational multivariate public key cryptosystems[C] ∥Post αuantum Cryptography-PQCrypto'2008.Berlin-Heidelberg:Springer-Verlag,2008:124-136.
  • 7Ye D F,Lam K Y,Dai Z D.Cryptanalysis of 2R schemes[C] ∥Advances in Cryptology-Crypto'1999.Berlin-Heidelberg:Springer-Verlag,1999:315-325.
  • 8Faugere J C,Perret L.Cryptanalysis of 2R-schemes[C] ∥Advances in Cryptology-Crypto'2006.Berlin-Heidelberg:Springer-Verlag,2006:357-372.

二级参考文献13

  • 1WENG Jian LIU ShengLi CHEN KeFei.Pirate decoder for the broadcast encryption schemes from Crypto 2005[J].Science in China(Series F),2007,50(3):318-323. 被引量:2
  • 2Huang X, Susilo W, Mu Y, et al. Proxy signature without random oracles [ C] //Proceedings of International Conferenee on Mobile Ad Hoe and Sensor Networks. Berlin/ Heidelberg: Springer-Verlag ,2006:473-484.
  • 3Waters B. Efficient identity-based encryption without random oracles [ C ]//Proceedings of Eurocrypt. Berlin/ Heidelberg: Springer-Verlag,2005 : 114-127.
  • 4Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model [ C ]//Proceedings of the 11 th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg:Springer-Verlag, 2006:207-222.
  • 5Shamir A. Identity-based cryptosystems and signature schemes [ C ] //Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag, 1984:47-53.
  • 6Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ]//Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag,2001:213-229.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York : ACM, 1996:48-57.
  • 8Kim S, Park S, Won D. Proxy signatures, revisited [ C ]// Proceedings of International Conference on Information and Communications Security. Berlin/Heidelberg: Springer-Verlag, 1997 : 223- 232.
  • 9Zhang F, Kim K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C ]//Proceedings of the 8th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg: Springer-Verlag, 2003: 312-323.
  • 10Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings [ C ]//Proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications. Berlin/Heidelberg: Springer-Verlag,2005 : 359-367.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部