期刊文献+

CFL可证明安全性分析 被引量:5

Analysis on CFL Provable Security
在线阅读 下载PDF
导出
摘要 公钥密码算法的可证明安全性理论,明确了密码体制的安全定义;建立起一种基本定义、基于归约证明的通用密码学研究方法;通过严格的证明把体制的安全性与已知的计算性难题或密码学关联起来.可证明安全性理论的研究推进了密码体制的标准化进程,很多标准化组织将密码体制的安全证明作为密码体制必备的安全属性,要求新提交的密码学标准中的算法能通过安全性证明,目前采用的密码学标准都遵从这种安全规范.在此基础上,证明了CFL是密钥不可恢复可证明安全的,同时证明了当CFL基于SM2,Hash函数满足随机语言机时,其为EUF-CMA安全的. Proven security theory of public key cryptography algorithm clears the defination of the security of cryptography;Establish a basic definition,general cryptography research method based on the reduction to prove;Through strict proof,it combines the safety of the system and the known computational problem or cryptography.Proven security theory research pushs forward the standardization of the password system,a lot of standardization organization puts cryptosystem security certification as one of the password system’s essential security properties,it requires new submission criteria of cryptography algorithm to be able to pass the security certificate?currently USES cryptography standards comply with this safety standards.It is proved that CFL is Provable Security with its private key being unrecoverable 9 and with EUF-CMA under some conditions.
作者 秦红兵 潘月君 范修斌 王海平 Qin Hongbing;Pan Yuejun;Fan Xiubin;and Wang Haiping(College of Maritime Ttransportation,Shandong Jiaotong University,Weihai,Shandong 264200;College of Science,Shandong University of Science and Technology,Zibo,Shandong 255000;Zhongke Guomin Institute of Science and Technology,Beijing 100086;Beijing Bowen Guangcheng Information Security Technology Limited Company,Beijing 102206)
出处 《信息安全研究》 2016年第7期589-599,共11页 Journal of Information Security Research
关键词 可证明安全性 公钥加密 极微本原 随机预言机 CFL(Chen Fan and Lü) provable security public key encryption atomic primitives random oracle model CFL(Chen,Fan,and Lii)
  • 相关文献

参考文献2

二级参考文献35

  • 1祝跃飞等.公钥密码学设计原理与可证明安全[M].北京:高等教育出版社,201066-68.
  • 2肖国镇,张宁译.密码学导引:原理和应用[M].北京:清华大学出版社,2008.179,195.
  • 3Katz J,Lindel Y.现代密码学--原理与协议[M].任伟译.北京:国防工业出版社,2010:313-318,280-281.
  • 4Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 5Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 6Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 7Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 8Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 9Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.
  • 10Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536.

共引文献108

同被引文献29

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部