期刊文献+

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
原文传递
导出
摘要 Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks. Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期469-477,共9页 中国计算机科学前沿(英文版)
基金 Acknowledgements This work was supported by the National Natural Science Foundation of China (Grant Nos. 61173151, 61173152) and the Fundamental Research Funds for the Central Universities (K5051270003).
关键词 symmetric encryption key-dependent message challenge function universal hash function ideal cipher model symmetric encryption, key-dependent message,challenge function, universal hash function, ideal cipher model
  • 相关文献

参考文献25

  • 1Adao P, Bana G, Herzog J, Scedrov A. Soundness of formal encryption in the presence of key-cycles. In: Proceedings of the 10th European Symposium on Research in Computer Security. 2005, 374-369.
  • 2Black J, Rogaway P, Shrimpton T. Encryption-scheme security in the presence of key-dependent messages. In: Proceedings of the 9th Annual International Workshop. 2002, 62-75.
  • 3Camenisch J, Lysyanskaya A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptographic Techniques. 2001,93-118.
  • 4Halevi S, Krawczyk H. Security under key-dependent inputs. In: Proceedings of the 14th ACM Conference on Computer and communicationssecurity.2008,466-475.
  • 5Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences, 1984,28(2): 270--299.
  • 6Backes M, Pfitzmann B, Scedrov A. Key-dependent message security under active attacks-BRSIM/UC-soundness of Dolev- Yao-style encryption with key cycles. Journal of Computer Security, 2008, 16(5): 497-530.
  • 7Hofheinz D, Unruh D. Towards key-dependent message security in the standard model. In: Proceedings of the 27th International Conference on the Theory and Application of Cryptographic Techniques. 2008, 108-126.
  • 8Haitner I, Holenstein T. On the (im)possibility of key dependent encryption. In: Proceedings of the 6th Theory of Cryptography Conference.2009,202-219.
  • 9Applebaum B, Cash D, Peikert C, Sahai A. Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Proceedings of the 29th Annual International Cryptology Conference.2009,595-618.
  • 10Barak B, Haitner I, Hofheinz D, Ishai Y. Bounded key-dependent message security. In: Proceedings of the 29th International Conference on the Theory and Application of Cryptographic Techniques. 2010, 423- 444.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部