期刊文献+

一种基于格的认证加密方案

Authentication encryption scheme based on lattice
下载PDF
导出
摘要 基于格上困难问题的密码体制成为当前研究的热点。基于R-LWE(ring-learning with errors)困难问题和广义压缩背包问题的哈希函数,构造了一种基于格的认证加密方案。方案在加密过程中利用了R-LWE困难问题,其加解密速度快、密文扩展率低等特性;认证过程使用的是广义压缩背包问题,其效率高,安全性能够达到IND-CPA(indistinguishability under chosen plaintext attack)。 Based on the R-LWE difficult problem and generalized compression knapsack problem hash function, this paper constructed a lattice-based authenticated encryption scheme. The new scheme made use of R-LWE difficult problem in the en- cryption and decryption, and had the good characteristic that the encryption and decryption speed was quick, the expansion ra- tio of the ciphertext was low. The authentication process was realized by using generalized compression knapsack problem, the efficiency, of which was very high, and its security could achieve IND-CPA.
出处 《计算机应用研究》 CSCD 北大核心 2013年第9期2788-2790,2794,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61272492 61103231 61103230)
关键词 R-LWE 认证加密 lattice R-LWE authentication encryption
  • 相关文献

参考文献12

  • 1李树栋.一个新的可公开验证的认证加密方案[J].烟台职业学院学报,2007(2):55-57. 被引量:1
  • 2章磊,卢建朱,凌捷,李家兰.一种新的基于多素数RSA认证加密方案[J].计算机应用研究,2005,22(5):105-107. 被引量:1
  • 3黄益栓,卢建朱.一种基于身份的认证加密新方案[J].计算机工程,2007,33(7):149-150. 被引量:8
  • 4蔡艳桃.一种基于身份的认证加密方案的改进[J].计算机工程与应用,2011,47(15):119-122. 被引量:4
  • 5AJTAI M. Generating hard instances of lattice problems[ C ]//Proc ofthe 28th Annual ACM Symposium on Theory of Computing. New York : ACM Press, 1996:99-108.
  • 6REGEV O. The learning with errors problem[ EB/OL]. http ://www. cs. tan. ac. iV odedr/papers/lwasurvey, pdf.
  • 7BLUM A, KALAI A, WASSERMAN H. Noise-tolerant learning, the parity problem, and she statistical query model [ J]. Journal of the ACM ,2003,50(4) :506-519.
  • 8ARORA S, GE Rong. New algorithms for learning in presence of er- rors [ C ]//Proc of the 38th International Colloquim Conference on Au- tomata, Languages and Programming, Volume Part I. 2011:4-03-415.
  • 9REGEV O. On lattices, learning with errors, random linear codes and cryptography [J]. Journal of the AGM,2009,56(6) :34.
  • 10LYUBASHEVSKY V, PEIKERT C, REGEV O. On ideal lattices and learning with errors over tings [ C ]//Proc of the 29th Annual Interna- tional Conference on the Theory and Applications of Cryptographic Techniques. Berlin : Springer-Verlag, 2010 : 1 - 23.

二级参考文献33

  • 1黄益栓,卢建朱.一种基于身份的认证加密新方案[J].计算机工程,2007,33(7):149-150. 被引量:8
  • 2Boneh D,Shacham H,Lynn B.Short signatures from the Weil pairing[C] //Advances in Cryptology-ASLACRYPT'2001.Berlin:Springer-Verlag,2001:514-532.
  • 3Barreto P S L M,Kim H Y,Lynn B,et al.Efficient algorithms for pairing-based cryptosystems[C] //Advances in Cryptology CRYPTO' 2002.Berlin:Springer-Verlag,2002:354-368.
  • 4Boneh D,Franklin M.Identity-based encryption from the Weil paring[C] //Advance in Cryptology-CRYPTO'2001.Berlin:Springer-Verlag,2001:213-229.
  • 5Chen Liqun,Lee J M.Improved identity-based signcryption[EB/OL].http://eprint.iacr.or-g/2004/114.
  • 6Shi Yijuan,Li Jianhua.Provable efficient certificate-less public key encryption[EB/OL].http://eprint.iacr.org/2005/287.
  • 7Hess F.Efficient identity based signature schemes based on pairings[C] //Proceedings of SAC.Berlin:Springer-Verlag,2002:310-324.
  • 8M Joye, P Paillier. How to Use RSA; or How to Improve the Efficiency of RSA Without Loosing Its Security[C]. Paris, France:2002 Information Security Solutions Europe Conference (ISSE2002), 2002.
  • 9D Boneh, X Ding, G Tsudik, et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities[C]. Washington, D.C., USA:the 10th USENIX Security Symposium,2001.297-308.
  • 10X Ding, G Tsudik. Simple Identity-based Encryption with Mediated RSA[C]. San Francisco,CA, USA:2003 Cryptographer's Track RSA Conference, 2003.193-210.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部