期刊文献+

标准模型下具有IND-CCA2安全的混合加密方案 被引量:3

Hybrid encryption scheme with IND-CCA2 secure in standard model
下载PDF
导出
摘要 基于ideal-SIS(ideal small integer solution)的一个变种,改进了Damien Stehle的陷门生成算法。利用改进的陷门生成算法对Stehle的选择明文攻击(CPA)安全方案进行了改进,然后结合SWIFFT压缩函数,提出了一种在标准模型下达到适应性选择密文攻击下的不可区分性(IND-CCA2)安全的混合加密方案。在该陷门产生过程中节省了n log q bit的描述位;与原有方案相比,新方案一次加解密的字符长度从n log q bit提高到了m×n log q。基于上述改进,新方案在运行所需的时间和空间效率方面有了很大的提高。 This paper improved the classical generating trapdoor algorithm based on a variant of ideal-SIS( ideal small integer solution) by Damien Stehle. What's more,the new scheme improved a chosen-plaintext attacks security scheme by Damien Stehle. Then,combining with SWIFFT compression functions,it designed an indistinguishable against adaptive chosen-ciphertext attacks secure hybrid encryption scheme in the standard model. In this process,the new scheme required n log q less description bit. It could process string from n log q bit to m × n log q bit in the encryption and decryption processing. There is a huge improvement in key size and speed for these schemes.
出处 《计算机应用研究》 CSCD 北大核心 2016年第4期1124-1127,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61103230 61272492) 武警工程大学基金课题(wjy201319)
关键词 混合加密 适应性选择密文攻击下的不可区分性 SWIFFT压缩函数 ideal-SIS问题 标准模型 hybrid encryption indistinguishable against adaptive chosen-ciphertext attacks secure SWIFFT compression functions ideal-SIS problem standard model
  • 相关文献

参考文献12

  • 1Shor P W. Polynomial time algorithms for discrete logarithms and factoring on a quantum computer[M] //Algorithmic Number Theory. Berlin:Springer, 1994:289.
  • 2Ajtai M. Generating hard instances of lattice problems[C] //Proc of the 28th Annual ACM Symposium on Theory of Computing . New York:ACM Press, 1996:99-108.
  • 3Nguyen P Q. The LLL algorithm:Survey and Applications[M] . [S. l.] :Springer, 2010.
  • 4Bellare M, Desai A, Pointcheval D, et al. Relations among notions of security for public-key encryption schemes[C] //Advances in Cryptology. Berlin:Springer, 1998:26-45.
  • 5Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks[C] //Proc of the 22nd Annual ACM Symposium on Theory of Computing. New York:ACM Press, 1990, 427-437.
  • 6Rackoff C, Simon D R. Non- interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C] // Advances in Cryptology. Berlin:Springer, 1992:433-444.
  • 7Stehle D, Steinfeld R, Tanaka K, et al. Efficient public key encryption based on ideal lattices[M] //Advances in Cryptology. Berlin:Springer, 2009:617-635.
  • 8杨晓元,吴立强,张敏情,张薇.基于R-LWE的公钥加密方案[J].通信学报,2013,34(2):23-30. 被引量:6
  • 9Micciancio D, Regev O. Worst-case to average-case reductions based on Gaussian measures[J] . SIAM Journal on Computing, 2007, 37(1):267-302.
  • 10Linder R. Towards efficient lattice-based cryptography[D] . Darmstadt:TU Darmstadt , 2011.

二级参考文献15

  • 1CHARLES R,DANIEL R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[A].California USA,1991.433-444.
  • 2ODED R. On lattice, learning with errors, random linear codes, and cryptography[A].New York,USA,2005.84-93.
  • 3CRAIG G,CHRIS P,VINOD V. Trapdoors for hard lattices and new cryptographic constructions[A].Victoria,British Co-lumbia,Canada,2008.197-206.
  • 4SHWETA A,DAN B,XAVIER B. Efficient lattice (H) IBE in the standard model[A].French Riviera,2010.553-572.
  • 5VADIM L,CHRIS P,ODED R. On ideal Lattices and learning with errors over rings[A].French Riviera,2010.1-23.
  • 6CHRIS P,BRENT W. Lossy trapdoor functions and their applica-tion[A].Victoria,British Columbia,Canada,2008.187-196.
  • 7CHRIS P. Public-key cryptosystems from the worst-case shortest vector problem[A].Bethesda,Maryland,2009.333-342.
  • 8XAVIER B,MEI Q X,BRENT W. Dircet chosen ciphertext security from identity-based techniques[A].Alexandria,VAUSA,2005.320-329.
  • 9DAMIEN S,STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[A].French Riviera,2011.24-47.
  • 10DAMIEN S,STEINFELD R,TANAKA K. Effcient public key en-cryption based on ideal lattices[A].{H}Springer-Verlag,2009.617-635.

共引文献5

同被引文献15

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部