期刊文献+

基于不可区分混淆的定时释放密码方案 被引量:1

New timed-release encryption based on indistinguishability obfuscation
下载PDF
导出
摘要 定时释放加密是一种将消息发送到未来的加密体制,构造出一个安全可行的定时释放加密方案可解决很多实际问题。针对不可区分混淆和定时释放密码方案进行了研究,提出一种方案,该方案将发送者的加密以及接收者的解密过程封装成电路,并利用不可区分混淆器混淆此电路,可以有效地利用混淆器混淆电路的时间,简化了方案,并且极大地提高了方案的安全性;最后证明了方案的正确性及安全性。 Timed-release encryption(TRE) is a cryptography that studies the problem of sending information into the future, it can solve many practical problems to construct a feasible and safe TRE. This paper proposed a scheme based on the research of indistinguishability obfuscation and TRE. This scheme encapsulated the sender' s encryption and receiver' s decryption by a circuit and obfuscated this circuit by an indistinguishability obfuscator. It could make great use of the time of obfuscators obfuscate circuits, simplified the scheme and improved the security of this scheme. Finally, this paper proves the correctness and security of this TRE scheme.
作者 王通 何宇帆 李磊 Wang Tong He Yufan Li Lei(State Key Laboratory of Integrated Service Networks, Xidian University, Xi' an 710071, China)
出处 《计算机应用研究》 CSCD 北大核心 2017年第9期2795-2798,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61472309)
关键词 定时释放加密 不可区分混淆 电路 timed-release encryption indistinguishability obfuscation circuit
  • 相关文献

参考文献1

二级参考文献85

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2G. Wroblewski. General method of program code obfuscation[D]. Doctoral dissertation, WroclawUniversity of Technology, Institute of Engineering Cybernetics, 2002.
  • 3C. Linn, S. Debray. Obfuscation of executable code to improve resistance to static disassembly[C]. The lOth ACM conference onComputer and communications security, pp.290-299, 2003.
  • 4W. Zhu, C. Thomborson. A provable scheme for homomorphic obfuscation in softwaresecurity[M]. CNIS 2005, 5: 208-212, 2005.
  • 5W. Zhu, C. Thomborson, F. Y. Wang. Applications of homomorphic functions to softwareobfuscation[J]. Intelligence and Security Informatics, LNCS 3917, pp. 152-153, Springer,2006.
  • 6A. Amarilli, D. Naccache, P. Rauzy, et al. Can a program reverse- engineer itself?[J]. Cryptography and Coding, LNCS 7089, pp. 1-9, Springer, 2011.
  • 7R. Giacobazzi. Hiding information in completeness holes: New perspectives in code obfuscation and watermarking[C]. SEFM 2008, pp. 7-18, 2008.
  • 8C. S. Collberg, C. Thomborson. Watermarking, tamper-proofing, and obfuscation-tools for software protection[M]. IEEE Transactions on Software Engineering, 28(8): 735-746,2002.
  • 9Z. A. Kissel. Obfuscation of the standard XOR encryption algorithm[J]. Crossroads, 11(3):6-6, 2005.
  • 10J. Bringer, H. Chabanne, T. lcart. On physical obfuscation of cryptographic algorithms[C]. INDOCRYPT 2009, LNCS 5922, pp. 88- 103, Springer, 2009.

共引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部