虛擬黑盒安全的程序混淆理論及應(yīng)用研究
發(fā)布時(shí)間:2017-12-28 05:44
本文關(guān)鍵詞:虛擬黑盒安全的程序混淆理論及應(yīng)用研究 出處:《湖北工業(yè)大學(xué)》2017年碩士論文 論文類(lèi)型:學(xué)位論文
更多相關(guān)文章: 混淆 虛擬黑盒特性 重加密 EVES
【摘要】:程序混淆(program obfuscation)是一個(gè)編譯器,它可以將一個(gè)程序(電路)轉(zhuǎn)換為一個(gè)可執(zhí)行的混淆過(guò)的程序,混淆后的程序在功能上與原程序保持一致,混淆后的電路大小與原程序保持在同一個(gè)數(shù)量級(jí),并且無(wú)法從混淆后的程序中獲得任何原程序中的有用信息。程序混淆在軟件保護(hù)、外包云計(jì)算、含有敏感信息的代理操作中有很大的實(shí)用價(jià)值,同時(shí)程序混淆在密碼學(xué)領(lǐng)域也有非常大的研究意義,目前已經(jīng)提出了對(duì)點(diǎn)函數(shù)(point function)、多比特輸出的點(diǎn)函數(shù)(multi-bit output point obfuscation)、不可否認(rèn)加密函數(shù)(deniable encryption)等函數(shù)的安全混淆。目前,程序混淆已經(jīng)成為當(dāng)前密碼學(xué)領(lǐng)域中研究的熱點(diǎn)和難點(diǎn),在2001年歐密會(huì)上,Barak等人已經(jīng)證明在基于斷言的定義下,不存在對(duì)所有圖靈機(jī)或所有電路的通用混淆。在過(guò)去的幾年中,程序混淆在復(fù)雜密碼學(xué)上取得了一些重大的突破,2007年Hohenberger提出了重加密函數(shù)的安全混淆,這是首個(gè)針對(duì)復(fù)雜密碼函數(shù)的安全混淆,隨后越來(lái)越多的混淆被提出。本文對(duì)近年來(lái)提出的特殊函數(shù)的安全混淆進(jìn)行了總結(jié)和分析,提出了一個(gè)匿名的重加密函數(shù)的安全混淆和一個(gè)EVES(encrypted verifiable encrypted signature)函數(shù)的安全混淆,并分別進(jìn)行了安全性證明。本文主要研究如下:(1)介紹了幾種密碼函數(shù)的混淆,詳細(xì)分析了重加密函數(shù)、加密簽名函數(shù)的構(gòu)成和混淆算法,并深入研究了這兩種混淆算法的安全性證明。(2)構(gòu)造了一個(gè)特殊的匿名重加密算法,對(duì)其進(jìn)行了安全混淆,并證明了混淆后的程序達(dá)到了虛擬黑盒安全。我們首先給出了一個(gè)兩種形式的加密方案,這兩種加密方案都達(dá)到了CCA安全,加密后的?(28)0的密文可以被重加密為?(28)1的密文,但是?(28)1的密文不可以再被重加密。這個(gè)混淆后的重加密程序可以在任意不可信的第三方代理或者云服務(wù)器上運(yùn)行,并且不會(huì)泄漏程序中的敏感信息。(3)構(gòu)造了一個(gè)特殊的EVES函數(shù),對(duì)其進(jìn)行了安全混淆,并證明了混淆后的程序的安全性。此方案是一個(gè)VES方案和線性加密方案的結(jié)合,混淆后的EVES程序可以在任意不可信的第三方代理或者云服務(wù)器執(zhí)行,程序會(huì)為簽名者產(chǎn)生一個(gè)加密的簽名,并且無(wú)法獲得簽名者的私鑰。
[Abstract]:(program obfuscation) program obfuscation is a compiler, it can be a program (circuit) into an executable obfuscated program, the program after obfuscation is consistent with the original program in function, circuit size and confusion after the original program remained in the same order of magnitude, and can not get any useful information in the original program from the obfuscated program. The program confusion has great practical value in the software outsourcing agency operation protection, cloud computing, containing sensitive information, but also has the significance of the research program obfuscation is very large in the field of cryptography, have been proposed to function (point, function) multi bit output function (multi-bit output point obfuscation), can not be deny the encryption function (deniable encryption) security confusion function. At present, the program confusion has become a hot and difficult research at present in the field of cryptography, in EUROCRYPT 2001, Barak et al have demonstrated in assertion based definition, there is no general confusion of all Turing machines or all circuits. In the past few years, program obfuscation has made some significant breakthroughs in complex cryptography. In 2007, Hohenberger proposed the security confusion of re encryption function, which is the first security confusion for complex cryptographic functions, and then more and more confusion has been put forward. This paper summarizes and analyzes the security confusion of special functions proposed in recent years. It proposes an anonymous double encryption function's security obfuscation and a EVES (encrypted verifiable encrypted signature) function's security confusion, and has carried on the security proof separately. This paper is mainly studied as follows: (1) the confusion of several cryptographic functions is introduced, and the composition and obfuscation algorithm of re encryption function, encrypted signature function are analyzed in detail, and the security proofs of the two obfuscation algorithms are further studied. (2) a special anonymous re encryption algorithm is constructed to confuse it safely, and it is proved that the confusing program achieves the security of the virtual black box. First, we give a two form of encryption scheme. These two encryption schemes all achieve CCA security. After encrypting, (28) 0 ciphertext can be re encrypted as (28) 1 ciphertext, but (28) 1 ciphertext can no longer be re encrypted. The obfuscation of the re encrypted program can run on any untrusted third party agent or cloud server, and does not leak sensitive information in the program. (3) a special EVES function is constructed to confuse it safely, and the security of the confusing program is proved. This scheme is a combination of VES scheme and linear encryption scheme. The EVES program can be executed on any untrusted third party agent or cloud server. The program generates an encrypted signature for the signer, and can not get the private key of the signer.
【學(xué)位授予單位】:湖北工業(yè)大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP314;TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 王建民;余志偉;王朝坤;付軍寧;;Java程序混淆技術(shù)綜述[J];計(jì)算機(jī)學(xué)報(bào);2011年09期
2 馮登國(guó);可證明安全性理論與方法研究[J];軟件學(xué)報(bào);2005年10期
,本文編號(hào):1344825
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/1344825.html
最近更新
教材專(zhuān)著