3-Methylthio-5-hydroxy-1,2,4-triazine(1c)reacted with substituted benzenesulfonyl chloride to give 3-methylthio-5-oxy-1,2,4-triazin-6-yl pyridinium betaine(4)in anhydrous pyridine.But when NaOH/H_2O/CH_3COCH_3 or NaOH...3-Methylthio-5-hydroxy-1,2,4-triazine(1c)reacted with substituted benzenesulfonyl chloride to give 3-methylthio-5-oxy-1,2,4-triazin-6-yl pyridinium betaine(4)in anhydrous pyridine.But when NaOH/H_2O/CH_3COCH_3 or NaOH/CH_3OH were used as reactant and solvent,3-methylthio-4-substituted benzenesulfonyl-5-oxo-6-hydroxy-1,4,5,6-tetrahydro-1,2,4-triazine(6)or 1-tosyl-3-methylthio-5-oxo-6-methyloxy-1,4,5,6-tetrahydro-1,2,4-triazine(7)was obtained respectively.The above reactions show anomalous properties of nucleophilic attack on 6-carbon in 1,2,4-triazine ring.展开更多
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos...As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.展开更多
针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访...针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访问控制,并引入密码逆向防火墙(CRF)技术有效抵御ASA。分析了SM9ABSE-CRF在判定性Diffie-Hellman(DBDH)假设下满足了选择关键词下的不可区分性,并形式化证明了CRF的部署满足维持功能性、保留安全性以及抵抗泄漏性。理论分析和仿真实验结果表明,与提供CRF的ABSE方案cABKSCRF(consistent Attribute-Based Keyword Search system with CRF)相比,SM9ABSE-CRF具有更高的安全性,并且在索引与陷门生成阶段也表现出显著的性能优势。展开更多
Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analys...Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding.展开更多
通过对Liu-Au-Susilo(2007)、Goranlta-Saxena(2005)、Cao-Paterson-Kou(2006)、Yap-Heng-Goi(2006)和Je Hong Park(2006)提出的无证书数字签名方案进行分析,指出了这几个方案中所存在的公钥替换攻击,并给出了攻击方法。列举出这些方案...通过对Liu-Au-Susilo(2007)、Goranlta-Saxena(2005)、Cao-Paterson-Kou(2006)、Yap-Heng-Goi(2006)和Je Hong Park(2006)提出的无证书数字签名方案进行分析,指出了这几个方案中所存在的公钥替换攻击,并给出了攻击方法。列举出这些方案安全性分析中所存在的缺陷,为避免这些缺陷,利用了Castro-Dahab(2007)的无证书数字签名方案的一般模式和分叉引理对原方案进行改进,改进后的方案是可证安全的。展开更多
基金Director of the project supported by National Natural Science foundation of China.
文摘3-Methylthio-5-hydroxy-1,2,4-triazine(1c)reacted with substituted benzenesulfonyl chloride to give 3-methylthio-5-oxy-1,2,4-triazin-6-yl pyridinium betaine(4)in anhydrous pyridine.But when NaOH/H_2O/CH_3COCH_3 or NaOH/CH_3OH were used as reactant and solvent,3-methylthio-4-substituted benzenesulfonyl-5-oxo-6-hydroxy-1,4,5,6-tetrahydro-1,2,4-triazine(6)or 1-tosyl-3-methylthio-5-oxo-6-methyloxy-1,4,5,6-tetrahydro-1,2,4-triazine(7)was obtained respectively.The above reactions show anomalous properties of nucleophilic attack on 6-carbon in 1,2,4-triazine ring.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2008AA092301 ) and the National Natural Science Foundation of China (No. 50879014).
文摘As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.
文摘针对属性基可搜索加密(ABSE)方案大都基于非国密算法设计,且无法抵抗内部算法替换攻击(ASA)的问题,提出一种支持密码逆向防火墙的基于SM9的属性基可搜索加密方案(SM9ABSE-CRF)。该方案将国密算法SM9扩展至ABSE领域,实现了细粒度数据访问控制,并引入密码逆向防火墙(CRF)技术有效抵御ASA。分析了SM9ABSE-CRF在判定性Diffie-Hellman(DBDH)假设下满足了选择关键词下的不可区分性,并形式化证明了CRF的部署满足维持功能性、保留安全性以及抵抗泄漏性。理论分析和仿真实验结果表明,与提供CRF的ABSE方案cABKSCRF(consistent Attribute-Based Keyword Search system with CRF)相比,SM9ABSE-CRF具有更高的安全性,并且在索引与陷门生成阶段也表现出显著的性能优势。
文摘Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack discussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding.
文摘通过对Liu-Au-Susilo(2007)、Goranlta-Saxena(2005)、Cao-Paterson-Kou(2006)、Yap-Heng-Goi(2006)和Je Hong Park(2006)提出的无证书数字签名方案进行分析,指出了这几个方案中所存在的公钥替换攻击,并给出了攻击方法。列举出这些方案安全性分析中所存在的缺陷,为避免这些缺陷,利用了Castro-Dahab(2007)的无证书数字签名方案的一般模式和分叉引理对原方案进行改进,改进后的方案是可证安全的。