抗輔助輸入CCA安全的PKE構造
發(fā)布時間:2018-07-30 06:26
【摘要】:輔助輸入模型是彈性泄露密碼學中一個重要的泄露模型,它定義了一族不可逆的函數(shù)去模擬一類密鑰泄露的情況.目前已有的抗輔助輸入公鑰加密方案(PKE)、身份基加密方案(IBE)都是選擇明文攻擊安全(CPA-secure)的,文中提出了一個抗輔助輸入選擇密文攻擊安全(CCA-secure)的PKE方案.方案的構造使用了Qin等人在亞密2013提出的一次泄露過濾函數(shù)(one-time lossy filter),并利用Goldreich-Levin定理構造抗輔助輸入的核心部分.方案的CCA安全證明利用了一次泄露過濾函數(shù)的泄露模式,在此模式下,由于僅泄露少量的私鑰信息,因而攻擊者對私鑰依然存在很大的不確定性,其查詢非法的密文會被挑戰(zhàn)者以高概率拒絕.
[Abstract]:The auxiliary input model is an important leak model in elastic leak cryptography. It defines a family of irreversible functions to simulate a class of key leaks. The existing anti-auxiliary input public-key encryption schemes (PKE), ID-based encryption schemes (IBE) are all selective plaintext attack security (CPA-secure). In this paper a PKE scheme against auxiliary input selective ciphertext attack (CCA-secure) is proposed. The scheme uses the primary leakage filter function (one-time lossy filter),) proposed by Qin et al in Yami 2013 and uses Goldreich-Levin theorem to construct the core part of the anti-auxiliary input. The CCA security proof of the scheme utilizes the leak mode of a leak filter function. In this mode, the attacker still has a lot of uncertainty about the private key because only a small amount of private key information is leaked. Its search for illegal ciphertext will be rejected by the challenger with a high probability.
【作者單位】: 南京郵電大學計算機學院;廣西大學計算機與電子信息學院;
【基金】:國家自然科學基金(61373006,61202353,61272422) 安徽大學信息保障技術協(xié)同創(chuàng)新中心2015年度開放課題資助~~
【分類號】:TP309
,
本文編號:2154104
[Abstract]:The auxiliary input model is an important leak model in elastic leak cryptography. It defines a family of irreversible functions to simulate a class of key leaks. The existing anti-auxiliary input public-key encryption schemes (PKE), ID-based encryption schemes (IBE) are all selective plaintext attack security (CPA-secure). In this paper a PKE scheme against auxiliary input selective ciphertext attack (CCA-secure) is proposed. The scheme uses the primary leakage filter function (one-time lossy filter),) proposed by Qin et al in Yami 2013 and uses Goldreich-Levin theorem to construct the core part of the anti-auxiliary input. The CCA security proof of the scheme utilizes the leak mode of a leak filter function. In this mode, the attacker still has a lot of uncertainty about the private key because only a small amount of private key information is leaked. Its search for illegal ciphertext will be rejected by the challenger with a high probability.
【作者單位】: 南京郵電大學計算機學院;廣西大學計算機與電子信息學院;
【基金】:國家自然科學基金(61373006,61202353,61272422) 安徽大學信息保障技術協(xié)同創(chuàng)新中心2015年度開放課題資助~~
【分類號】:TP309
,
本文編號:2154104
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2154104.html
最近更新
教材專著