期刊文献+

抗泄漏的CCA安全的加密方案 被引量:2

Leakage Resilient Encryption Against Adaptive Chosen Ciphertext Attack
下载PDF
导出
摘要 由于大量攻击可能泄漏传统密码方案中要求绝对保密的信息,进而破坏了传统密码方案的安全性,所以设计抗泄漏的安全密码方案成为密码研究的一个迫切需要解决的问题,尤其从2009年至今更是吸引了广大学者的注意,取得一定成果。本文在基于身份的抗泄露的自适应选择明文攻击(CPA)安全的加密方案基础上,进行改进,通过结合一个强的一次真实模拟可提取的非交互零知识协议,取得基于身份的抗泄露自适应选择密文攻击(CCA)的安全加密方案,提高了系统的安全性能。 Recently, a lot of attacks leak some important information which should be kept secret absolutely, so the security of many traditional cryptosystems is broken. Since 2009, designing cryptosystems which are resilient to leakage gets more and more attention. On the basis of an identify-based leakage resilient CPA secure encryption, the paper associates with a strong one-time true simulation extractable NIZK, ultimately gains an identify-based leakage resilient CCA secure encryption, which improves the security.
机构地区 宿迁学院三系
出处 《计算机与现代化》 2013年第11期77-81,共5页 Computer and Modernization
关键词 抗泄露 自适应选择密文攻击 非交互零知识 加密 leakage resilient adaptive chosen ciphertext attack non-interactive zero knowledge encryption
  • 相关文献

参考文献25

  • 1Halderman J A, Schoen S D, Heninger N, et al. Lest we remember: Cold-boot attacks on encryption keys[ J]. Com- munications of the ACM, 2009,52 (5) : 91-98.
  • 2Boneh D, Demillo R, Lipton R J. On the importance of checking cryptographic protocols for faults [ C ]// EURO- CRYPT '97. Berlin: Springer, LNCS 1233, 1997:37-51.
  • 3Biham E, Shamir A. Differential fault analysis of secret key cryptosystems [ C ]//CRYPTO' 97. Berlin : Springer, LNCS 1294, 1997:513-525.
  • 4Gadolfi K, Mourtel C, Olivier F. Electromagnetic analy- sis: Concrete results[ C]// CHES' 2001. Berlin: Spring- er, LNCS 2162, 2001:251-261.
  • 5Kocher P. Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems[ C] //CRYPTO' 96. Berlin: Springer, LNCS 1109, 1996:104-113.
  • 6Macali S, Reyzin L. Physically observable cryptography [C]//TCC 2004. Berlin: Springer, LNCS 2951, 2004: 278-296.
  • 7Akavia A, Goldwasser S, Vaikuntanathan V. Simultaneous hardcore bits and cryptography against memory attacks [ C ]// TCC 2009. Berlin : Springer, LNCS 5444, 2009 : 474-495.
  • 8Pietrzak K. A leakage-resilient mode of operation [ C ]// EUROCRYPT 2009. Berlin: Springer, LNCS 5479, 2009: 462-482.
  • 9Dziembowski S, Pietrzak K. Leakage-resilient cryptography [ C]//Foundations of Computer Science 2008. 2008:293- 302.
  • 10Faust S, Kihz E, Pietrzak K, et al. Leakage-resilient sig- natures[C]//TCC' 2010. Berlin: Springer, LNCS 5978, 2010 : 343-360.

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部