期刊文献+

强安全可调加密方案的两个密码特性

Two Cryptographic Properties of Strong Security Tweakable Enciphering Scheme
下载PDF
导出
摘要 该文在同时具备选择明文攻击和选择密文攻击的条件下,给出了可调加密方案的分类攻击安全和广义分类攻击安全的概念,并证明了二者的等价性;证明了抗基本区分攻击安全和抗左右不可区分攻击安全的可调加密方案一定是分类攻击安全和广义分类攻击安全的,从而揭示了强安全可调加密方案一定具有分类攻击安全和广义分类攻击安全这两个密码特性。 This paper presents the concepts of sorted-attack security and generalized sorted-attack security of tweakable enciphering schemes under chosen-plaintext and chosen-ciphertext attacks.Firstly,it is proved that those two notions are equivalence.Secondly,it is proved that the basic distinguishing attack security and the left-or-right distinguishing attack security guarantee sorted-attack security and generalized sorted-attack security,therefore reveals that a strong tweakable enciphering scheme have those two cryptographic properties.
作者 郭瑞 金晨辉
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第7期1761-1764,共4页 Journal of Electronics & Information Technology
基金 河南省杰出青年科学基金(0312001800)资助课题
关键词 密码学 可调加密方案 分类攻击安全 广义分类攻击安全 Cryptography Tweakable enciphering scheme Sorted-attack security Generalized sorted-attack security
  • 相关文献

参考文献13

  • 1Halevi S and Rogaway P. A tweakable enciphering mode[C]. CRYPTO'03, Berlin, 2003, LNCS 2729: 482-499.
  • 2王鹏,冯登国.TAE模式的分析和改进[J].软件学报,2006,17(2):333-338. 被引量:2
  • 3Bellare M, Desai A, Jokipii E, and Rogaway P. A concrete security treatment of symmetric encryption[C]. IEEE Computer Society, Washington, D.C, 1997: 394-403.
  • 4陈原,白恩健,肖国镇.两种语义安全性定义的等价性[J].电子学报,2009,37(10):2149-2153. 被引量:2
  • 5Goldwasser S. Probabilistic encryption [J]. Journal of Computer and System Science, 1984, 28(2): 270-299.
  • 6Sarkar P, Tweakable enciphering schemes h'om stream ciphers with IV [EB/OL]. Cryptology ePrint Archive, Report 2009/312, 2009.
  • 7Wang Peng, Feng Dengguo, and Wu Wen-ling. HCTR: a variable-input-length enciphering mode [C]. CISC, Berlin, 2005, LNCS 3822: 175-188.
  • 8Chakraborty D and Sarkar P. HCH: a new tweakable enciphering scheme using the hash-counter-hash approach[JI. IEEE Transactions on Information Theory, 2008, 54(4): 1683-1699.
  • 9Sarkar P. Efficient tweakable enciphering schemes from (block-wise) universal hash functions[J]. IEEE Transactions on Information Theo*~g, 2009, 55(10): 4749-4760.
  • 10Martin Gagne, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. Automated security proof for symmetric encryption modes[C]. ASIAN'09, 2009, Berlin, LNCS 5913: 39-53,.

二级参考文献17

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 2王大印,林东岱,吴文玲.一种可证明安全的消息认证码[J].电子学报,2006,34(10):1812-1816. 被引量:3
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4Rogaway P,Bellare M,Black J,Krovetz T.OCB:A block-cipher mode of operation for efficient authenticated encryption In:Samarati P,ed.Proc.of the 8th ACM Conf.on Computer and Communication Security.New York:ACM Press,2001.196-205.
  • 5Bellare M,Rogaway P,Wagner D.The EAX mode of operation.In:Roy B,Meier W,eds.Fast Software Encryption 2004.LNCS 3017,Springer-Verlag,2004.389-407.
  • 6Kohno T,Viega J,Whiting D.CWC:A high-performance conventional authenticated encryption mode.In:Roy B,Meier W,ed.Fast Software Encryption 2004.LNCS 3017,Springer-Verlag,2004.408-426.
  • 7Liskvo M,Rivset RL,Wagner D.Tweakable block cipher.In:Yung M,ed.Advances in Cryptology-CRYPTO 2002.LNCS 2442,Springer-Verlag,2002.31-46.
  • 8Crowley P.Mercy:A fast large block cipher for disk sector encryption.In:Schneier B,ed.Fast Software Encryption 2000.LNCS 1978,Springer-Verlag,2001.49-63.
  • 9D Hofheinz,D Unrtth. Towards key-dependent message security in the standard model[ A].In EUROCRYPT 2008[ C], LNCS 4965, Istanbul, Turkey: Springer, 2008.108 - 126.
  • 10R Cramer, G Hanaoka, D Hofheinz, et al. Bounded CCA2-secure encryption[A]. In ASIACRYPT 2007[C], LNCS 4833, Kuching, Malaysia: Springer 2007 .502 - 518.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部