期刊文献+

基于RO模型的公钥加密方案安全性分析与证明

Analysis and Proving of the Security on Public Key Scheme Based on RO Model
原文传递
导出
摘要 信息安全是信息社会存在的根基,而密码学是信息安全技术的核心部分,因此,对密码方案或协议的设计与应用的安全性成为人们最为关注的问题。本文首先介绍随机预言模型(RO)及相关的归约论断和敌手模型定义,并运用这种模型对公钥加密方案进行了安全性分析,同时给出了证明,结果达到预期的安全性目标。 Information Security is the fundamentality of the security society,but the cryptography is the key technology of information seCurity, so the security of design and application to crypto scheme or protocol becomes the most focus issue for people.First,this paper introduction the RO model,correlation induction judgement and define adversary model,then analyzing and proving the security of the scheme of public key with this model,and achieved the expectation result.
出处 《网络安全技术与应用》 2012年第9期11-13,共3页 Network Security Technology & Application
基金 国家自然科学基金(编号:60970017) 铜仁学院科研启动基金(编号:TS10013 TS10017 TS10018)资助
关键词 RO模型 哈希函数 归约论断 RO model Hash function induction judgement
  • 相关文献

参考文献7

  • 1Bellare M. Practice-Oriented provable-security.ln: Damgard I,ed.Modem Cryptology in Theory and Practice.LNCS 1561,Berlin, Heidelberg:Spdnger-Verlag. 1999.
  • 2Goldreich O.Foundations of Cryptography.Cambridge:Cambridge University Press.2001.
  • 3Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Science. 1984.
  • 4Goldwasser S,Micali S,Rivest R.A digital signature scheme secure against adaptive chosen-message attacks.SIAM Journal of Computing. 1988.
  • 5Bellare M,Rogaway P.Random oracles are practicahA paradigm for designing etficient protocols.ln: Proc.of the 1st ACM Ctnf. on Computer and Communications Security.New York:ACM Press. 1993.
  • 6张文政.公钥密码体制可证明安全性的几点注记[J].信息安全与通信保密,2005,27(7):125-127. 被引量:4
  • 7冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104

二级参考文献37

  • 1Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 2Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 3Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 4Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 5Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 6Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.
  • 7Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536.
  • 8Burrows M, Abadi M, Needham R. A logic for authentication. ACM Trans. on Computer Systems, 1990,8(1):18-36.
  • 9Bellare M, Rogaway P. Entity authentication and key exchange. In: Stinson D.R, ed. Proc. of the Advances in CryptologyCrypto'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993. 232-249.
  • 10Bellare M. Provably secure session key distribution-The three party case. In: Proc. of the ACM Symp. on the Theory of Computing. New York: ACM Press, 1995.57-66. http:∥doi.acm.org/10.1145/225058.225084.

共引文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部