抗輔助輸入CCA安全的PKE構(gòu)造
發(fā)布時(shí)間:2018-07-30 06:26
【摘要】:輔助輸入模型是彈性泄露密碼學(xué)中一個(gè)重要的泄露模型,它定義了一族不可逆的函數(shù)去模擬一類密鑰泄露的情況.目前已有的抗輔助輸入公鑰加密方案(PKE)、身份基加密方案(IBE)都是選擇明文攻擊安全(CPA-secure)的,文中提出了一個(gè)抗輔助輸入選擇密文攻擊安全(CCA-secure)的PKE方案.方案的構(gòu)造使用了Qin等人在亞密2013提出的一次泄露過濾函數(shù)(one-time lossy filter),并利用Goldreich-Levin定理構(gòu)造抗輔助輸入的核心部分.方案的CCA安全證明利用了一次泄露過濾函數(shù)的泄露模式,在此模式下,由于僅泄露少量的私鑰信息,因而攻擊者對(duì)私鑰依然存在很大的不確定性,其查詢非法的密文會(huì)被挑戰(zhàn)者以高概率拒絕.
[Abstract]:The auxiliary input model is an important leak model in elastic leak cryptography. It defines a family of irreversible functions to simulate a class of key leaks. The existing anti-auxiliary input public-key encryption schemes (PKE), ID-based encryption schemes (IBE) are all selective plaintext attack security (CPA-secure). In this paper a PKE scheme against auxiliary input selective ciphertext attack (CCA-secure) is proposed. The scheme uses the primary leakage filter function (one-time lossy filter),) proposed by Qin et al in Yami 2013 and uses Goldreich-Levin theorem to construct the core part of the anti-auxiliary input. The CCA security proof of the scheme utilizes the leak mode of a leak filter function. In this mode, the attacker still has a lot of uncertainty about the private key because only a small amount of private key information is leaked. Its search for illegal ciphertext will be rejected by the challenger with a high probability.
【作者單位】: 南京郵電大學(xué)計(jì)算機(jī)學(xué)院;廣西大學(xué)計(jì)算機(jī)與電子信息學(xué)院;
【基金】:國(guó)家自然科學(xué)基金(61373006,61202353,61272422) 安徽大學(xué)信息保障技術(shù)協(xié)同創(chuàng)新中心2015年度開放課題資助~~
【分類號(hào)】:TP309
,
本文編號(hào):2154104
[Abstract]:The auxiliary input model is an important leak model in elastic leak cryptography. It defines a family of irreversible functions to simulate a class of key leaks. The existing anti-auxiliary input public-key encryption schemes (PKE), ID-based encryption schemes (IBE) are all selective plaintext attack security (CPA-secure). In this paper a PKE scheme against auxiliary input selective ciphertext attack (CCA-secure) is proposed. The scheme uses the primary leakage filter function (one-time lossy filter),) proposed by Qin et al in Yami 2013 and uses Goldreich-Levin theorem to construct the core part of the anti-auxiliary input. The CCA security proof of the scheme utilizes the leak mode of a leak filter function. In this mode, the attacker still has a lot of uncertainty about the private key because only a small amount of private key information is leaked. Its search for illegal ciphertext will be rejected by the challenger with a high probability.
【作者單位】: 南京郵電大學(xué)計(jì)算機(jī)學(xué)院;廣西大學(xué)計(jì)算機(jī)與電子信息學(xué)院;
【基金】:國(guó)家自然科學(xué)基金(61373006,61202353,61272422) 安徽大學(xué)信息保障技術(shù)協(xié)同創(chuàng)新中心2015年度開放課題資助~~
【分類號(hào)】:TP309
,
本文編號(hào):2154104
本文鏈接:http://www.sikaile.net/kejilunwen/ruanjiangongchenglunwen/2154104.html
最近更新
教材專著