虛擬黑盒安全的程序混淆理論及應(yīng)用研究
發(fā)布時間:2017-12-28 05:44
本文關(guān)鍵詞:虛擬黑盒安全的程序混淆理論及應(yīng)用研究 出處:《湖北工業(yè)大學(xué)》2017年碩士論文 論文類型:學(xué)位論文
更多相關(guān)文章: 混淆 虛擬黑盒特性 重加密 EVES
【摘要】:程序混淆(program obfuscation)是一個編譯器,它可以將一個程序(電路)轉(zhuǎn)換為一個可執(zhí)行的混淆過的程序,混淆后的程序在功能上與原程序保持一致,混淆后的電路大小與原程序保持在同一個數(shù)量級,并且無法從混淆后的程序中獲得任何原程序中的有用信息。程序混淆在軟件保護(hù)、外包云計算、含有敏感信息的代理操作中有很大的實(shí)用價值,同時程序混淆在密碼學(xué)領(lǐng)域也有非常大的研究意義,目前已經(jīng)提出了對點(diǎn)函數(shù)(point function)、多比特輸出的點(diǎn)函數(shù)(multi-bit output point obfuscation)、不可否認(rèn)加密函數(shù)(deniable encryption)等函數(shù)的安全混淆。目前,程序混淆已經(jīng)成為當(dāng)前密碼學(xué)領(lǐng)域中研究的熱點(diǎn)和難點(diǎn),在2001年歐密會上,Barak等人已經(jīng)證明在基于斷言的定義下,不存在對所有圖靈機(jī)或所有電路的通用混淆。在過去的幾年中,程序混淆在復(fù)雜密碼學(xué)上取得了一些重大的突破,2007年Hohenberger提出了重加密函數(shù)的安全混淆,這是首個針對復(fù)雜密碼函數(shù)的安全混淆,隨后越來越多的混淆被提出。本文對近年來提出的特殊函數(shù)的安全混淆進(jìn)行了總結(jié)和分析,提出了一個匿名的重加密函數(shù)的安全混淆和一個EVES(encrypted verifiable encrypted signature)函數(shù)的安全混淆,并分別進(jìn)行了安全性證明。本文主要研究如下:(1)介紹了幾種密碼函數(shù)的混淆,詳細(xì)分析了重加密函數(shù)、加密簽名函數(shù)的構(gòu)成和混淆算法,并深入研究了這兩種混淆算法的安全性證明。(2)構(gòu)造了一個特殊的匿名重加密算法,對其進(jìn)行了安全混淆,并證明了混淆后的程序達(dá)到了虛擬黑盒安全。我們首先給出了一個兩種形式的加密方案,這兩種加密方案都達(dá)到了CCA安全,加密后的?(28)0的密文可以被重加密為?(28)1的密文,但是?(28)1的密文不可以再被重加密。這個混淆后的重加密程序可以在任意不可信的第三方代理或者云服務(wù)器上運(yùn)行,并且不會泄漏程序中的敏感信息。(3)構(gòu)造了一個特殊的EVES函數(shù),對其進(jìn)行了安全混淆,并證明了混淆后的程序的安全性。此方案是一個VES方案和線性加密方案的結(jié)合,混淆后的EVES程序可以在任意不可信的第三方代理或者云服務(wù)器執(zhí)行,程序會為簽名者產(chǎn)生一個加密的簽名,并且無法獲得簽名者的私鑰。
[Abstract]:(program obfuscation) program obfuscation is a compiler, it can be a program (circuit) into an executable obfuscated program, the program after obfuscation is consistent with the original program in function, circuit size and confusion after the original program remained in the same order of magnitude, and can not get any useful information in the original program from the obfuscated program. The program confusion has great practical value in the software outsourcing agency operation protection, cloud computing, containing sensitive information, but also has the significance of the research program obfuscation is very large in the field of cryptography, have been proposed to function (point, function) multi bit output function (multi-bit output point obfuscation), can not be deny the encryption function (deniable encryption) security confusion function. At present, the program confusion has become a hot and difficult research at present in the field of cryptography, in EUROCRYPT 2001, Barak et al have demonstrated in assertion based definition, there is no general confusion of all Turing machines or all circuits. In the past few years, program obfuscation has made some significant breakthroughs in complex cryptography. In 2007, Hohenberger proposed the security confusion of re encryption function, which is the first security confusion for complex cryptographic functions, and then more and more confusion has been put forward. This paper summarizes and analyzes the security confusion of special functions proposed in recent years. It proposes an anonymous double encryption function's security obfuscation and a EVES (encrypted verifiable encrypted signature) function's security confusion, and has carried on the security proof separately. This paper is mainly studied as follows: (1) the confusion of several cryptographic functions is introduced, and the composition and obfuscation algorithm of re encryption function, encrypted signature function are analyzed in detail, and the security proofs of the two obfuscation algorithms are further studied. (2) a special anonymous re encryption algorithm is constructed to confuse it safely, and it is proved that the confusing program achieves the security of the virtual black box. First, we give a two form of encryption scheme. These two encryption schemes all achieve CCA security. After encrypting, (28) 0 ciphertext can be re encrypted as (28) 1 ciphertext, but (28) 1 ciphertext can no longer be re encrypted. The obfuscation of the re encrypted program can run on any untrusted third party agent or cloud server, and does not leak sensitive information in the program. (3) a special EVES function is constructed to confuse it safely, and the security of the confusing program is proved. This scheme is a combination of VES scheme and linear encryption scheme. The EVES program can be executed on any untrusted third party agent or cloud server. The program generates an encrypted signature for the signer, and can not get the private key of the signer.
【學(xué)位授予單位】:湖北工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP314;TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 王建民;余志偉;王朝坤;付軍寧;;Java程序混淆技術(shù)綜述[J];計算機(jī)學(xué)報;2011年09期
2 馮登國;可證明安全性理論與方法研究[J];軟件學(xué)報;2005年10期
,本文編號:1344825
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/1344825.html
最近更新
教材專著