期刊文献+

密钥隔离密码系统研究现状 被引量:3

A Survey of Key-Insulated Cryptography
下载PDF
导出
摘要 当密码系统被部署到不安全环境或者遇到木马攻击时,密钥泄漏问题将不可避免.为减少密钥泄漏带来的损失,基于密钥进化思想的前向安全、密钥隔离以及入侵容忍等密码体制被陆续提出.其中,由Dodis于2002年提出的能够同时达到前向安全和后向安全的密钥隔离密码系统(Key-Insulated Cryptosystem)已成为信息安全界及密码学界的研究热点.鉴于该系统在抵御密钥泄漏中的重要性,文中对密钥隔离密码系统的研究进展进行了综述.不仅对密钥隔离系统的基本概念、形式化定义、安全模型以及安全要求进行了阐述,同时对密钥隔离方案的设计原理进行了深入分析.最后对目前已有的密钥隔离加密、签名以及密钥协商方案进行了分析,并对当前的方案从性能、安全模型及安全性等方面进行了比较. When the cryptosystem is deployed into the hostile environment, the secret key leakage seems to be inevitable. In order to ease the destructive result incurred by key compromise, forward security, intrusion tolerance and key-insulated cryptosystem has been proposed based on the idea of key evolution respectively. The key-insulated cryptosystem, which was initially introduced in 2002 by Dodis, has attracted extensive concern from the information security and cryptology community since this mechanism can simultaneously achieve forward security and backward security. Due to the significance of key-insulated cryptosystem, this paper offers a solid survey of key-insulated cryptosystem. This paper not only describes the basic concepts, formal definition, security models and security requirements of key-insulated system, but also analyzes design philosophy. Finally, this paper reviews the existing key-insulated cryptosystems in view of the public-key certificate authentication approach, efficiency and formal security proof.
出处 《计算机学报》 EI CSCD 北大核心 2015年第4期759-774,共16页 Chinese Journal of Computers
基金 国家自然科学基金(61003230 61370026) 广东省产学研重点项目(2012B091000054) 四川省应用基础研究计划项目(2014JY0041)资助~~
关键词 密码系统 密钥泄漏 密钥隔离 加密 签名 密钥协商 密码学 cryptosystem key-insulated key compromise encryption signature key agreement cryptography
  • 相关文献

参考文献4

二级参考文献52

  • 1Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Proc. of the Crypto'84. LNCS 196, Berlin: Springer-Verlag, 1984.47-53.
  • 2Anderson R. Two remarks on public-key cryptology. Invited lecture. In: Proc. of the CCCS'97. 1997. http://www.cl.cam.ac.uk/ users/rjal4/
  • 3Bellare M, Miner S. A forward-secure digital signature scheme. In: Wiener M, ed. Proc. of the CRYPTO'99. LNCS 1666, Berlin: Springer-Verlag, 1999.431-448.
  • 4Itkis G, Reyzin L. SiBIR: Signer-base intrusion-resilient signatures. In: Yung M, ed. Proc. of the Crypto 2002. LNCS 2442, Berlin: Springer-Verlag, 2002.499-514.
  • 5Dodis Y, Katz J, Xu S, Yung M. Key-Insulated public-key cryptosystems. In: Knudsen LR, ed. Proc. of the Eurocrypt 2002. LNCS 2332, Berlin: Springer-Verlag, 2002.65-82.
  • 6Bellare M, Palacio A. Protecting against key exposure: Strongly key-insulated encryption with optimal threshold. 2002. http://eprint. iacr.org/2002/064
  • 7Hanaoka Y, Hanaoka G, Shikata J, Imai H. Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. In: Deng R, Qing S, Bao F, Zhou J, eds. Proc. of the ICICS 2002. LNCS 2513, Berlin: Springer-Verlag, 2002.85-96.
  • 8Dodis Y, Yung M. Exposure-Resilience for free: The hierarchical ID-based encryption case. In: Proc. of the IEEE SISW 2002. 2002.45-52.
  • 9Cheon JH, Hopper N, Kim Y, Osipkov I. Authenticated key-insulated public key encryption and timed release cryptography. 2004. http://eprint.iacr.org/2004/231
  • 10Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, ed. Proc. of the ASIACRYPT 2005. LNCS 3788, Berlin: Springer-Verlag, 2005. 495-514.

共引文献21

同被引文献30

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部