期刊文献+

基于合数剩余假设伪熵函数的优化

An Improvement of Pseudo-Entropy Functions Based on Composite Residuosity Assumption
下载PDF
导出
摘要 2011年Braverman等人在伪随机函数的概念上提出了自适应泄漏弹性的伪熵函数.针对该方案抗泄漏量一定的问题,文中对该方案进行改进,基于合数剩余假提出新的构建方案.从证明结果可以看出,新方案具有更高的抗泄漏量. Braverman introduces pseudo-entropy functions based on pseudo-random functions in 2011.But the amount of leakage is not high enough,this paper we propose a new pseudo-entropy function based on composite residuosity assumption.From the proof,we can see that our new scheme can stand up more leakage.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第11期157-160,165,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(61070170) 苏州市应用基础研究计划项目(SYJG09024) 苏州市融合通信重点实验室(SZS0805)
关键词 自适应泄漏 有损陷门函数 DDH假设 合数剩余假设 adaptive leakage lossy trapdoor functon DDH assumption composite residuosity assumption
  • 相关文献

参考文献7

  • 1Halderman J A, Schoen S D,Heninger N,et al. Lestwe remember: Cold boot attacks on encryption keys[C] // In USENIX Security Sympo-sium, SAN JOSECA,2008: 45-60.
  • 2Kocher P C. Timing attacks on implementations of dif-fie-hellman,ras,dss,and other systems[C]// CRYP-TO, Springer-Verlay, 1996 : 104-113.
  • 3Kocher P C? Jaffe J,Jun B. Differential power analy-sis[C]// In CRYPTO, 1999:388-397.
  • 4D A Osvik, A. Shamir, E. Tromer. Cache attacksand countermeaures : The case of aes[C] // In CT-RSA, San Jose CA USA:IEEE,2006 : 1-20.
  • 5M. Braverman,A, Hassidim, Y. T. Kalai. LeakyPseudo-Entropy Functions [C] // Computer ScienceBeijng. China:[s. n. ] 2011.
  • 6C. Peikert and B. Waters. Lossy trapdoor functionsand their applications [ C ] // In STOC. Victoria,British Columbia, Canada:IEEE, 2008: 187-196.
  • 7J. Damgard and M. Jurik. A generalization, a simplifi-cation and some applications of Paillier’s probabilisticpublic-key system [C] // In PKC,2001? Che Ju Is-land, Korea:IEEE, 1992 : 119-136.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部