基于新“0”測試參數(shù)的理想格上多線性映射
發(fā)布時間:2018-12-17 21:44
【摘要】:密碼學(xué)中的多線性映射具有廣泛應(yīng)用,包括多方密鑰交換、廣播加密、基于身份的加密、基于屬性的加密、不可區(qū)分模糊器和函數(shù)加密等.雖然多線性映射存在無限應(yīng)用的可能,但目前多線性映射構(gòu)造方案僅有三個——GGH13、CLT13和GGH15,且它們都存在"0"化攻擊、新的難度假設(shè)和可信安裝的安全問題.針對第一個多線性映射候選構(gòu)造方案GGH13,Hu和Jia最近基于"0"化攻擊提出了攻擊GGH13構(gòu)造的多項式時間算法,完全破解了基于GGH13映射的兩個重要應(yīng)用——多方密鑰交換協(xié)議(MPKE)和使用3-精確覆蓋問題的證據(jù)加密方案(WE).本文主要改進(jìn)理想格上的GGH13構(gòu)造方案,以解決其存在的"0"化攻擊和可信安裝的安全問題.首先,為避免"0"化攻擊問題,作者通過設(shè)計新的"0"測試參數(shù)提出基于新隨機化方法的多線性映射構(gòu)造,其安全性基于新的困難問題假設(shè)——ext-GDDH/ext-GCDH;其次,為去除可信安裝問題,作者使用中國剩余定理提出無可信安裝的理想格上多線性映射構(gòu)造,其安全性基于新的困難問題假設(shè)——wots-ext-GCDH/wots-ext-GDDH;最后,作者給出基于改進(jìn)多線性映射構(gòu)造的多方密鑰交換協(xié)議nr-MPKE和wots-MPKE.
[Abstract]:Multi-linear mapping in cryptography has a wide range of applications, including multi-party key exchange, broadcast encryption, identity-based encryption, property-based encryption, indistinguishable ambiguity and function encryption. Although there is a possibility of infinite application of multilinear mappings, there are only three schemes for constructing multilinear mappings at present-GGH13,CLT13 and GGH15, both of which have "zero" attacks, new difficulty assumptions and security problems of trusted installation. For the first candidate construction scheme of multilinear mapping, GGH13,Hu and Jia, a polynomial time algorithm is proposed to attack GGH13 construction based on the "0" attack recently. Two important applications based on GGH13 mapping are completely cracked: Multi-party key exchange protocol (MPKE) and evidence encryption scheme (WE).) using 3-precision coverage problem. This paper mainly improves the GGH13 construction scheme on ideal lattice to solve the security problems of "0" attack and trusted installation. First of all, in order to avoid the "0" attack problem, the author designs a new "0" test parameter to construct the multilinear mapping based on the new randomization method. Its security is based on the assumption of a new difficult problem, ext-GDDH/ext-GCDH;. Secondly, in order to remove the trusted installation problem, the author uses the Chinese residue theorem to construct the multilinear mapping on ideal lattice without trusted installation. Its security is based on the assumption of a new difficult problem, wots-ext-GCDH/wots-ext-GDDH;. Finally, the author gives the multi-party key exchange protocols nr-MPKE and wots-MPKE. based on the improved multilinear mapping.
【作者單位】: 江蘇理工學(xué)院計算機工程學(xué)院 中國科學(xué)院信息工程研究所信息安全國家重點實驗室
【基金】:國家自然科學(xué)基金(61672270,61602216) 教育部人文社會科學(xué)研究項目(14YJAZH023,15YJCZH129) 中國科學(xué)院信息安全國家重點實驗室開放課題面上項目(2015-MSB-10) 江蘇省“青藍(lán)工程”中青年學(xué)術(shù)帶頭人項目(KYQ14004) 江蘇省高校優(yōu)秀中青年教師和校長境外研修計劃 常州市應(yīng)用基礎(chǔ)研究指導(dǎo)性項目(2016365)資助~~
【分類號】:TN918.1
本文編號:2384837
[Abstract]:Multi-linear mapping in cryptography has a wide range of applications, including multi-party key exchange, broadcast encryption, identity-based encryption, property-based encryption, indistinguishable ambiguity and function encryption. Although there is a possibility of infinite application of multilinear mappings, there are only three schemes for constructing multilinear mappings at present-GGH13,CLT13 and GGH15, both of which have "zero" attacks, new difficulty assumptions and security problems of trusted installation. For the first candidate construction scheme of multilinear mapping, GGH13,Hu and Jia, a polynomial time algorithm is proposed to attack GGH13 construction based on the "0" attack recently. Two important applications based on GGH13 mapping are completely cracked: Multi-party key exchange protocol (MPKE) and evidence encryption scheme (WE).) using 3-precision coverage problem. This paper mainly improves the GGH13 construction scheme on ideal lattice to solve the security problems of "0" attack and trusted installation. First of all, in order to avoid the "0" attack problem, the author designs a new "0" test parameter to construct the multilinear mapping based on the new randomization method. Its security is based on the assumption of a new difficult problem, ext-GDDH/ext-GCDH;. Secondly, in order to remove the trusted installation problem, the author uses the Chinese residue theorem to construct the multilinear mapping on ideal lattice without trusted installation. Its security is based on the assumption of a new difficult problem, wots-ext-GCDH/wots-ext-GDDH;. Finally, the author gives the multi-party key exchange protocols nr-MPKE and wots-MPKE. based on the improved multilinear mapping.
【作者單位】: 江蘇理工學(xué)院計算機工程學(xué)院 中國科學(xué)院信息工程研究所信息安全國家重點實驗室
【基金】:國家自然科學(xué)基金(61672270,61602216) 教育部人文社會科學(xué)研究項目(14YJAZH023,15YJCZH129) 中國科學(xué)院信息安全國家重點實驗室開放課題面上項目(2015-MSB-10) 江蘇省“青藍(lán)工程”中青年學(xué)術(shù)帶頭人項目(KYQ14004) 江蘇省高校優(yōu)秀中青年教師和校長境外研修計劃 常州市應(yīng)用基礎(chǔ)研究指導(dǎo)性項目(2016365)資助~~
【分類號】:TN918.1
【相似文獻(xiàn)】
相關(guān)期刊論文 前1條
1 葉茂;胡學(xué)先;劉文芬;;基于理想格的近似平滑投射Hash函數(shù)[J];信息工程大學(xué)學(xué)報;2013年01期
相關(guān)博士學(xué)位論文 前1條
1 劉亮;線性映射在安全協(xié)議中的應(yīng)用研究[D];西安電子科技大學(xué);2016年
相關(guān)碩士學(xué)位論文 前4條
1 孫榮辛;理想格問題的局部—整體算法研究[D];大連理工大學(xué);2015年
2 賽煒;基于理想格的公鑰密碼中模多項式的應(yīng)用研究[D];西安電子科技大學(xué);2014年
3 彭巧;基于多線性映射的秘密共享研究[D];貴州大學(xué);2017年
4 孫意如;格簽名&簽密方案的設(shè)計與實現(xiàn)[D];山東科技大學(xué);2017年
,本文編號:2384837
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2384837.html
最近更新
教材專著