期刊文献+

基于多比特输出点函数混淆器的消息认证码 被引量:1

Message Authentication Code Based on Point Function Obfuscator with Multi-bit Outputs
在线阅读 下载PDF
导出
摘要 大多数消息认证码的安全性只依赖于Hash函数,但部分Hash函数未被证明是安全的。为此,提出一种基于多比特输出点函数混淆器的消息认证方案,在此基础上,利用带多比特输出点函数混淆器和带密钥的Hash函数构造一个新的消息认证码方案。分析结果表明,该方案的安全性同时依赖于Hash函数和多比特输出点函数混淆器,可以更好地保证数据传输的完整性。 Security of most message authentication codes depends on Hash function,but some Hash functions have not been proved safe.This paper presents a new kind of message authentication scheme based on point function obfuscator with multi-bit outputs and a Message Authentication Code(MAC) construction scheme including a point function obfuscator with multi-bit outputs and Hash function with key.Analysis results demonstrate security of the scheme depends on the Hash function and point function obfuscator with multi-bit outputs,so it can better guarantee the integrity of the data transmission.
出处 《计算机工程》 CAS CSCD 2013年第1期144-148,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61070250) 北京市自然科学基金资助项目(4102055)
关键词 消息认证码 混淆器 虚拟灰盒混淆 带密钥的Hash函数 对称加密 嵌套MAC Message Authentication Code(MAC) obfuscator Virtual Grey Box(VGB) obfuscation Hash function with key symmetric encryption nested MAC
  • 相关文献

参考文献10

  • 1王大印,林东岱,吴文玲.消息认证码研究[J].通讯和计算机(中英文版),2005,2(10):76-81. 被引量:4
  • 2Barak B,Goldreich O,Impagliazzo R. On the (Im)possibility of Obfuscating Program[A].[S.1.]:Springer,2001.1-18.
  • 3Canetti R,Dakdouk R R. Obfuscating Point Functions with Multibit Output[A].[S.1.]:Springer,2008.489-508.
  • 4Bitansky N,Canetti R. On Strong Simulation and Composable Point Obfuscation[A].Santa Barbara,USA:[s.n.],2010.520-537.
  • 5Haitner I,Holenstein T. On the (Im)possibility of Key Dependent Encryption[A].[S.1.]:Springer-Vedag,2009.202-219.
  • 6Canetti R,Kalai Y T,Varia M. On Symmetric Encryption and Point Obfuscation[A].Heidelberg:Springer-verlag,2010.
  • 7Bitansky N,Canetti R. On Strong Simulation and Composable Point Obfuscation[EB/OL].http://eprint.iacr.org,2011.
  • 8Stinson D R;冯登国.密码学原理与实践[M]北京:电子工业出版社,2003.
  • 9Black J,Halevi S,Krawczyk H. UMAC:Fast and Secure Message Authentication[A].Heidelberg:Springer-Verlag,1999.216-245.
  • 10于洪波.杂凑函数以及HMAC/NMAC的安全性分析[D]济南:山东大学,2007.

共引文献3

同被引文献84

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2G. Wroblewski. General method of program code obfuscation[D]. Doctoral dissertation, WroclawUniversity of Technology, Institute of Engineering Cybernetics, 2002.
  • 3C. Linn, S. Debray. Obfuscation of executable code to improve resistance to static disassembly[C]. The lOth ACM conference onComputer and communications security, pp.290-299, 2003.
  • 4W. Zhu, C. Thomborson. A provable scheme for homomorphic obfuscation in softwaresecurity[M]. CNIS 2005, 5: 208-212, 2005.
  • 5W. Zhu, C. Thomborson, F. Y. Wang. Applications of homomorphic functions to softwareobfuscation[J]. Intelligence and Security Informatics, LNCS 3917, pp. 152-153, Springer,2006.
  • 6A. Amarilli, D. Naccache, P. Rauzy, et al. Can a program reverse- engineer itself?[J]. Cryptography and Coding, LNCS 7089, pp. 1-9, Springer, 2011.
  • 7R. Giacobazzi. Hiding information in completeness holes: New perspectives in code obfuscation and watermarking[C]. SEFM 2008, pp. 7-18, 2008.
  • 8C. S. Collberg, C. Thomborson. Watermarking, tamper-proofing, and obfuscation-tools for software protection[M]. IEEE Transactions on Software Engineering, 28(8): 735-746,2002.
  • 9Z. A. Kissel. Obfuscation of the standard XOR encryption algorithm[J]. Crossroads, 11(3):6-6, 2005.
  • 10J. Bringer, H. Chabanne, T. lcart. On physical obfuscation of cryptographic algorithms[C]. INDOCRYPT 2009, LNCS 5922, pp. 88- 103, Springer, 2009.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部