期刊文献+

公钥密码体制与选择密文安全性 被引量:11

PKC and chosen ciphertext security
下载PDF
导出
摘要 讨论了公钥密码体制对选择密文攻击的安全性(简称为选择密文安全性或IND CCA2),比较和分析了几种使一般公钥密码体制达到IND CCA2的方法,对目前所有达到IND CCA2的方法进行了分类,从而找到它们的一个共同特点:构造密文合法性测试.指出了OAEP+的IND CCA2证明中存在的问题,并给出了两种解决方法. Security against the chosen ciphertext attack of PKC is discussed (simply denoted by chosen ciphertext security of IND-CCA2). Some schemes which make general PKCs IND-CCA2 are compared and analyzed, on the basis of which we classify all the present methods which can obtain IND-CCA2 and find a common idea among them, which is the contruction of a test of ciphertext validity. Finally a problem in the IND-CCA2 security proof of OAEP+ is pointed out together with its two solutions.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期135-139,共5页 Journal of Xidian University
基金 国家重点基础研究发展规划(973项目)资助项目(G1999035804)
关键词 公钥密码体制 选择密文攻击 随机预言机 安全性 IND-CCA2 密文合法性测试 chosen ciphertext attack random Oracle provable security IND-CCA2
  • 相关文献

参考文献16

  • 1Goldwasser S, Micali S. Probabilistic Encryption[J]. Computer and System Sciences, 1984, 28(2) : 270-299.
  • 2Bellare M, Rogaway P. Random Oracles are Practical: a Paradigm for Designing Efficient Protocols [ A ]. Proceedings of the First Annual Conference on Computer and Communications Secruity[ C ]. New York: ACM, 1993. 62-73.
  • 3Bellare M, Desai A, Pointcheval D, et al. Relations Among Notions of Security for Public-key Encryption Schemes[A]. Crypt'98:LNCS 1462[C]. Berlin: Springer-Verlag, 1998. 26-45.
  • 4Micali S, Rackoff C, Sloan R. The Notion of Security for Probabilistic Cryptosystems[J]. SIAM J on Computing, 1988, 17(2) : 412-426.
  • 5Dolev D, Dwork C, Naor M. Non-malleable Cryptography[J]. SIAM J on Computing, 2000, 30(2): 391--437.
  • 6Bellare M, Sahai A. Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization[A]. Crypto'99: LNCS 1666[C]. Berlin: Springer-Verlag, 1999. 519-536.
  • 7Watanahe Y, Shikata J,Imai H. Equivalence between Semantic Security and Indistinguishability Against Chosen Ciphertext Attacks[A]. PKC'2003: LNCS 2567[C]. Berlin: Springer-Veralg, 2003. 71-84.
  • 8Shoup V. Why Chosen Ciphertext Security Matters[S]. Research Report 3076( # 93122), 1998.
  • 9Bellare M, Rogaway P. Optimal Asymmetric Encryption--How to Encrypt with RSA[A]. Eurocrypt'94: LNCS 950[C]. Berlin:Springer-Verlag, 1994. 92-111.
  • 10Shoup V. OAEP Reconsidered [DB/OL]. http ://www. shoup. net/papers/. 2001-12-20.

同被引文献135

引证文献11

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部