期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于DCR假设的KDM-CCA安全性
1
作者 郭伟 常金勇 高磊 《计算机工程与应用》 CSCD 北大核心 2017年第12期116-120,共5页
加密方案的KDM(Key-Dependent Message)安全性定义依赖于某一特定的函数族F。通过引入一类新的函数族,证明了在两个用户的情形下,Cramer和Shoup提出了基于DCR(Decisional Composite Residuosity)假设的方案(以下称为CS-DCR方案),关于这... 加密方案的KDM(Key-Dependent Message)安全性定义依赖于某一特定的函数族F。通过引入一类新的函数族,证明了在两个用户的情形下,Cramer和Shoup提出了基于DCR(Decisional Composite Residuosity)假设的方案(以下称为CS-DCR方案),关于这类新函数族具有KDM-CCA安全性。由于CS-DCR方案本身非常得高效,因此,获得了兼有高效性和(相应)KDM-CCA安全性的加密方案。 展开更多
关键词 dcr假设 KDM安全性 CCA安全性 公钥加密 Cramer-Shoup 方案
下载PDF
A new approach for UC security concurrent deniable authentication 被引量:6
2
作者 FENG Tao LI FengHua +1 位作者 MA JianFeng SangJae MOON 《Science in China(Series F)》 2008年第4期352-367,共16页
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions. 展开更多
关键词 information security concurrent deniable authentication universally composable verifiably smooth projective hashing the decisional composite residuosity assumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部