如何抵抗与因子分解相关的私钥获取攻击,是RSA型加密方案的一个重要研究课题.就RSA型加密方案而言,目前普遍采用的抵抗与因子分解相关的私钥获取攻击的方法是优化系统参数,但该方法是被动的.本文分析了现有的针对RSA型加密系统的与因子...如何抵抗与因子分解相关的私钥获取攻击,是RSA型加密方案的一个重要研究课题.就RSA型加密方案而言,目前普遍采用的抵抗与因子分解相关的私钥获取攻击的方法是优化系统参数,但该方法是被动的.本文分析了现有的针对RSA型加密系统的与因子分解相关的私钥获取攻击,找出这些攻击能够成功的关键因素.然后将RSA、Rabin两个加密系统与Diffie-Hellman密钥交换协议融合在一起设计了一个能抗自适应性选择密文攻击的加密方案.此方案具有如下三个属性:(1)该方案不仅能高效地实现加密操作,而且还能避免出已经出现的各种与因子分解相关的私钥获取攻击(量子算法除外);(2)该方案的私钥d的私密性具有信息论意义;(3)该方案在标准模型下,对自适应性选择密文攻击具有不可区分语义安全(indistinguishability under chosen-ciphertext attack,IDN-CCA).展开更多
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti...This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.展开更多
文摘如何抵抗与因子分解相关的私钥获取攻击,是RSA型加密方案的一个重要研究课题.就RSA型加密方案而言,目前普遍采用的抵抗与因子分解相关的私钥获取攻击的方法是优化系统参数,但该方法是被动的.本文分析了现有的针对RSA型加密系统的与因子分解相关的私钥获取攻击,找出这些攻击能够成功的关键因素.然后将RSA、Rabin两个加密系统与Diffie-Hellman密钥交换协议融合在一起设计了一个能抗自适应性选择密文攻击的加密方案.此方案具有如下三个属性:(1)该方案不仅能高效地实现加密操作,而且还能避免出已经出现的各种与因子分解相关的私钥获取攻击(量子算法除外);(2)该方案的私钥d的私密性具有信息论意义;(3)该方案在标准模型下,对自适应性选择密文攻击具有不可区分语义安全(indistinguishability under chosen-ciphertext attack,IDN-CCA).
基金Supported by the National Basic Research Program of China (973 Program) (2007CB311201)the National High-Technology Research and Development Program of China (863 Program) (2006AA01Z427)the National Natural Science Foundation of China (60673073)
文摘This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.