期刊文献+

一个加密方案的选择密文安全性的证明 被引量:1

Proving the Security of an Encryption Scheme under the Chosen Ciphertext Attacks
在线阅读 下载PDF
导出
摘要 由带Hash的ElGamal加密与Schnorr签名构成的加密方案尽管从直观上看是抗选择密文攻击的,但以前的证明中或者需要在线知识提取假设,或者只能在更受限制的GenericGroup模型中得以证明,因此,其严格的归约化证明仍然是一个公开问题.作者在Gap Diffie-Hellman(GDH)假设下,在Random Oracle模型中,利用了Random Oracle Hash函数的特点模仿解密而严格证明了该方案确实达到了这个强安全级别. The encryption constructed by combing the Hashed ElGamal encryption and Schnorr signature looks like secure against chosen ciphertext attack, but its security is still not formally proved despite some attempts are made , among which some needs the non standard on llne knowledge extractor assumption and some another needs the more restricted Generic Group Model. Here, for the first time , the authors give a reductionist proof that the scheme is really achieving this strong secure level under the standard Gap Diffie-Hellman(GDH) assumption in the Random Oracle Model. The reason the authors could achieving this proof is that we construct the decryption simulator utilizing the property of Random Oracle Hash property and avoid the previously used knowledge extractor.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第1期71-77,共7页 Journal of Sichuan University(Natural Science Edition)
基金 国家自然科学基金(60302015) 信息安全国家重点实验室2004年第1批开放课题(01-01)
关键词 加密 选择密文安全性 GAP Diffie—Hellman假设 RANDOM Oracle模型 encryption chosen ciphertext security Gap Diffie-Hellman assumption Random Oracle Model
  • 相关文献

参考文献19

  • 1Rackoff C,Simon D.Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack.In Advances in Cryptology Crypto ' 91[C].Berlin:Springer-Verlag,1991.433 - 444.
  • 2Asokan N,Shoup V,Waidner M.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in Communications,2000,18(4) :593 - 610.
  • 3Bellare M ,Canetti R ,Krawczyk H.A modular approach to thedesign and analysis of authentication and key exchange protocols.In 30th Annual ACM Symposium on Theory of Computing[C].NewYork:ACM Press,1998.
  • 4Bellare M ,Pointcheval D,Rogaway P.Authenticated Key Exchange Secure Against Dictionary Attacks.Advances in Eurocrypt 2000[C].Berlin:Springer-Verlag,2000.139 - 155.
  • 5Bellare M,Rogaway P.Optimal asymmetric encryption.In Advances inCryptology-Eurocrypt '94[C].Berlin:Springer-Verlag,1994,92- 111.
  • 6Working Group 2 of ISO/IEC JTC 1/SC27,editor V.Shoup.ISO 18033-2:An Emerging Standard for Public-Key Encryption[EB/OL].Committee Draft of January 15,2004.http://www.shoup.net.
  • 7Shoup V,Gennaro R.Securing threshold cryptosystems against chosen ciphertext attack[J].Journal of Cryptology ,2002(4):223 - 249.
  • 8ElGamal T.A public key cryptosystem and signature scheme based on discrete logarithms[J].IEEE Trans.Inform.Theory,1985,31:469 - 472.
  • 9Schnorr C P.Efficient signature generation by smart cards[J] .Joumal of Cryptology,1991,4(3):161 - 174.
  • 10Okamoto T,Pointscheval D.The gap-problems:a new class of problems for the security of cryptographic schemes.Proceedings of Public Key Cryptography 2001 [C].Berlin:Springer-Verlag ,2001.

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部