期刊文献+

可抵御唯密文攻击的基于格的公钥加密

Lattice-based public-key encryption with resistance of ciphertext-only attack
下载PDF
导出
摘要 针对最新提出的对Cai-Cusick公钥加密方案的唯密文攻击进行研究,提出了一个可抵御该攻击的新的公钥加密方案。通过对原始加密方案中某些参数的修改,改变了公钥中向量长度,从而实现对原始方案攻击的有效抵御,并且通过程序模拟出新的加密方案。从数据分析可得,随着实验次数的增加,该方案抵御唯密文攻击的成功概率近似为百分之百。这说明了新的加密方案能有效抵御最新提出的唯密文攻击,且由于该方案延续了原始加密方案的加密步骤,其也具备了更少密文扩展的特性。今后将进一步研究语义安全的可抵御唯密文攻击的有效加密方案。 This paper proposed a new lattice-based public-key encryption which could resist the chosen ciphertext attack against Cai-Cusick encryption scheme. A small modification on parameters of the original scheme yielded this new scheme. This paper made a program to simulate this new scheme and found that with growth of the number of experiences, the probability of resisting chosen ciphertext was approximate to one. Hence, this new scheme could resist the attack efficiently. On the other hand, this improved encryption scheme also inherited the benefits from the original scheme, of less ciphertext expansion. It draw a conclusion that this scheme has less ciphertext expansion and can prevent the ciphertext-only attack.
作者 李君
出处 《计算机应用研究》 CSCD 北大核心 2014年第1期196-198,209,共4页 Application Research of Computers
关键词 唯密文攻击 公钥加密 最短向量问题 格密码 ciphertext-only attack lattice public-key encryption SVP lattice-based cryptography
  • 相关文献

参考文献15

  • 1SHOR P W. Algorithms for quantum computation:discrete logarithms and factoring[A].Washington DC:IEEE Computer Society,1994.124-134.
  • 2AJTAI M. Generating hard instances of lattice problems[A].New York:ACM Press,1996.99-108.
  • 3AJTAI M,DWORK C. A public-key cryptosystem with worst-case/average-case equivalence[A].New York:ACM Press,1997.284-293.
  • 4AJTAI M,DWORK C. The first and fourth public-key cryptosystems with worst-case/average-case equivalence[A].2007.97-134.
  • 5GOLDREICH O,GOLDWASSER S,HALEVI S. Public-key cryptosystems from lattice reduction problems[A].Berlin:Springer-Verlag,1997.112-131.
  • 6HOFFSTEIN J,HOWGRAVE-GRAHAM N,PIPHER J. NTRUS:digital signatures using the NTRU lattice[A].Berlin:Springer-Verlag,2003.122-140.
  • 7PEIKERT C. Public-key cryptosystems from the worst-case shortest vector problem[A].New York:ACM Press,2009.333-342.
  • 8REGEV O. On lattices,learning with errors,random linear codes,and cryptography[J].Journal of the ACM,2009,(06):34.
  • 9MICCIANCIO D,REGEV O. Lattice-based cryptography[A].Berlin:Springer-Verlag,2009.147-191.
  • 10REGEV O. Lattice-based cryptography[A].Berlin:Springer-Verlag,2006.131-141.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部