期刊文献+

随机谕言模型 被引量:5

Random Oracle Model
下载PDF
导出
摘要 介绍了可证明安全理论中的重要工具——随机谕言模型,包括随机谕言模型的起源、基本性质和方法、随机谕言模型中的代表方案、明文知晓性质、随机谕言的实例化、随机谕言不可实例化的性质和相关负面结论以及对弱化的随机谕言模型的研究.此外,比较了随机谕言模型和其他理想模型,简介了标准模型中的方案设计状况. This paper gives a survey of the random oracle model, which is an important tool in provable security. The random oracle model is introduced on several aspects, including its origin and development, basic properties and methodology, representative schemes, plaintext awareness, random oracle instantiation, the uninstantiable properties and related negative results, and the research of weakened random oracle models. Besides, other ideal models are compared with the random oracle model, and the construction of encryption schemes in the standard model is also referred.
出处 《软件学报》 EI CSCD 北大核心 2012年第1期140-151,共12页 Journal of Software
基金 国家自然科学基金(61070171) 国家重点基础研究发展计划(973)(2007CB311201)
关键词 公钥密码学 可证明安全 随机谕言模型 随机谕言实例化 随机谕言的不可实例化性质 弱化的随机谕言模型 public-key cryptography provable security random oracle model random oracle instantiation uninstantiability of random oracle weakened random oracle model
  • 相关文献

参考文献46

  • 1Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Denning DE, Pyle R, Ganesan R, Sandhu RS, Ashby V, eds. Proc. of the 1 st ACM Conf. on Computer and Communications Security. New York: ACM Press, 1993.62-67. [doi: 10.1145/168588.168596].
  • 2Goldwasser S, Micali S. Probabilistic eneryption. Journal of Computer and System Science, 1984,28(2):270-299. [doi: 10.1016/ 0022-0000(84)90070-9].
  • 3Feng DG. Research on Theory and Approach of Provable Security. Journal of Software, 2005,16(10): 1743-1756 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/16/1743.htm [doi: 10.1360/jos161743].
  • 4Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko A, ed. Proe. of the Advances in Cryptology--Crypto'86. LNCS 263, Berlin, Heidelberg: Springer-Verlag, 1986. 186-194. [doi: 10.1007/3-540- 47721-7_12].
  • 5Goldwasser S, Taumann YT. On the (in) security of the Fiat-Shamir paradigm. In: Proc. of the 44th Symp. on Foundations of Computer Sciences. Washington: IEEE Computer Society, 2003. 102-115. [doi: 10.1109/SFCS.2003.1238185].
  • 6Man W, Wrote; Wang JL, Trans. Modem Cryptography: Theory and Practice. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese).
  • 7Bellare M, Rogaway P. Optimal asymmetric encryption. In: Santis AD, ed. Proc. of the Advances in Cryptology-- EUROCRYPT'94. LNCS 950, Berlin, Heidelberg: Springer-Verlag, 1995.92-111.
  • 8Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Wiener MJ, ed. Proc. of the Advances in Cryptology--CRYPTO'99. LNCS 1666, London: Springer-Verlag, 1999. 537-554. [doi: 10.1007/3-540-48405-1_34].
  • 9Shoup V. OAEP reconsidered. In: Kilian J, ed. Proc. of the Advances in Cryptology--Crypto 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 239-259. [doi: 10.1007/3-540-44647-8_15].
  • 10Fujisaki E, Okamoto T, Pointcheval D, Stern J. RSA-OAEP is secure under the RSA assumption. In: Kilian J, ed. Proc. of the Advances in Cryptology---Crypto 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 260-274. [doi: 10.1007/s00145- 002-0204-y].

同被引文献45

  • 1黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 2陈航,周剑岚,冯珊.基于SHA和RSA算法 实用有效的双向身份认证系统[J].计算机安全,2006(4):6-8. 被引量:16
  • 3曹晓静.S/KEY认证系统的分析与改进[J].计算机安全,2007(4):31-33. 被引量:2
  • 4ABE M, FUJISAKI E. How to date blind signatures[C]//Asiacrypt96. Berlin: Springer-Verlag, 1996: Z44-Z~l.
  • 5CHAUM D. Blind signatures for untraceable payments[C]//Advances in Cryptoiogy- CRYPTO'82, New York: Plenum Publishing Corporation, 1982.. 199-203.
  • 6AL-RIYAMI S, PATERSON S K G. Certificateless Public Key Cryptography [C]//Proceedings of ASIACRYPT' 03. Berlin: Springer-Verlag, 2003.. 452-473.
  • 7ZHANG Lei, ZHANG Fu-tai, QIN Bo, et al. Provably-secure electronic cash based on certi~cateless partially-blind signatures[J]. Electronic Commerce Research and Applications, 2011, 5(10): 545-552.
  • 8CANARD S,JAMBERT A. Untraceability and profiling are not mutually exclusive[A].Beilin:Springer-Verlag,2010.117-128.
  • 9FUJII A,OHTAKE G,HANAOKA G. Anonymous authentication scheme for subscription services[A].Beilin:Springer-Verlag,2007.975-983.
  • 10BLANTON M. Online subscriptions with anonymous access[A].New York:ACM,2008.217-227.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部