天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 碩博論文 > 信息類碩士論文 >

虛擬黑盒安全的程序混淆理論及應(yīng)用研究

發(fā)布時間:2017-12-28 05:44

  本文關(guān)鍵詞:虛擬黑盒安全的程序混淆理論及應(yīng)用研究 出處:《湖北工業(yè)大學(xué)》2017年碩士論文 論文類型:學(xué)位論文


  更多相關(guān)文章: 混淆 虛擬黑盒特性 重加密 EVES


【摘要】:程序混淆(program obfuscation)是一個編譯器,它可以將一個程序(電路)轉(zhuǎn)換為一個可執(zhí)行的混淆過的程序,混淆后的程序在功能上與原程序保持一致,混淆后的電路大小與原程序保持在同一個數(shù)量級,并且無法從混淆后的程序中獲得任何原程序中的有用信息。程序混淆在軟件保護(hù)、外包云計算、含有敏感信息的代理操作中有很大的實(shí)用價值,同時程序混淆在密碼學(xué)領(lǐng)域也有非常大的研究意義,目前已經(jīng)提出了對點(diǎn)函數(shù)(point function)、多比特輸出的點(diǎn)函數(shù)(multi-bit output point obfuscation)、不可否認(rèn)加密函數(shù)(deniable encryption)等函數(shù)的安全混淆。目前,程序混淆已經(jīng)成為當(dāng)前密碼學(xué)領(lǐng)域中研究的熱點(diǎn)和難點(diǎn),在2001年歐密會上,Barak等人已經(jīng)證明在基于斷言的定義下,不存在對所有圖靈機(jī)或所有電路的通用混淆。在過去的幾年中,程序混淆在復(fù)雜密碼學(xué)上取得了一些重大的突破,2007年Hohenberger提出了重加密函數(shù)的安全混淆,這是首個針對復(fù)雜密碼函數(shù)的安全混淆,隨后越來越多的混淆被提出。本文對近年來提出的特殊函數(shù)的安全混淆進(jìn)行了總結(jié)和分析,提出了一個匿名的重加密函數(shù)的安全混淆和一個EVES(encrypted verifiable encrypted signature)函數(shù)的安全混淆,并分別進(jìn)行了安全性證明。本文主要研究如下:(1)介紹了幾種密碼函數(shù)的混淆,詳細(xì)分析了重加密函數(shù)、加密簽名函數(shù)的構(gòu)成和混淆算法,并深入研究了這兩種混淆算法的安全性證明。(2)構(gòu)造了一個特殊的匿名重加密算法,對其進(jìn)行了安全混淆,并證明了混淆后的程序達(dá)到了虛擬黑盒安全。我們首先給出了一個兩種形式的加密方案,這兩種加密方案都達(dá)到了CCA安全,加密后的?(28)0的密文可以被重加密為?(28)1的密文,但是?(28)1的密文不可以再被重加密。這個混淆后的重加密程序可以在任意不可信的第三方代理或者云服務(wù)器上運(yùn)行,并且不會泄漏程序中的敏感信息。(3)構(gòu)造了一個特殊的EVES函數(shù),對其進(jìn)行了安全混淆,并證明了混淆后的程序的安全性。此方案是一個VES方案和線性加密方案的結(jié)合,混淆后的EVES程序可以在任意不可信的第三方代理或者云服務(wù)器執(zhí)行,程序會為簽名者產(chǎn)生一個加密的簽名,并且無法獲得簽名者的私鑰。
[Abstract]:(program obfuscation) program obfuscation is a compiler, it can be a program (circuit) into an executable obfuscated program, the program after obfuscation is consistent with the original program in function, circuit size and confusion after the original program remained in the same order of magnitude, and can not get any useful information in the original program from the obfuscated program. The program confusion has great practical value in the software outsourcing agency operation protection, cloud computing, containing sensitive information, but also has the significance of the research program obfuscation is very large in the field of cryptography, have been proposed to function (point, function) multi bit output function (multi-bit output point obfuscation), can not be deny the encryption function (deniable encryption) security confusion function. At present, the program confusion has become a hot and difficult research at present in the field of cryptography, in EUROCRYPT 2001, Barak et al have demonstrated in assertion based definition, there is no general confusion of all Turing machines or all circuits. In the past few years, program obfuscation has made some significant breakthroughs in complex cryptography. In 2007, Hohenberger proposed the security confusion of re encryption function, which is the first security confusion for complex cryptographic functions, and then more and more confusion has been put forward. This paper summarizes and analyzes the security confusion of special functions proposed in recent years. It proposes an anonymous double encryption function's security obfuscation and a EVES (encrypted verifiable encrypted signature) function's security confusion, and has carried on the security proof separately. This paper is mainly studied as follows: (1) the confusion of several cryptographic functions is introduced, and the composition and obfuscation algorithm of re encryption function, encrypted signature function are analyzed in detail, and the security proofs of the two obfuscation algorithms are further studied. (2) a special anonymous re encryption algorithm is constructed to confuse it safely, and it is proved that the confusing program achieves the security of the virtual black box. First, we give a two form of encryption scheme. These two encryption schemes all achieve CCA security. After encrypting, (28) 0 ciphertext can be re encrypted as (28) 1 ciphertext, but (28) 1 ciphertext can no longer be re encrypted. The obfuscation of the re encrypted program can run on any untrusted third party agent or cloud server, and does not leak sensitive information in the program. (3) a special EVES function is constructed to confuse it safely, and the security of the confusing program is proved. This scheme is a combination of VES scheme and linear encryption scheme. The EVES program can be executed on any untrusted third party agent or cloud server. The program generates an encrypted signature for the signer, and can not get the private key of the signer.
【學(xué)位授予單位】:湖北工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP314;TP309

【參考文獻(xiàn)】

相關(guān)期刊論文 前2條

1 王建民;余志偉;王朝坤;付軍寧;;Java程序混淆技術(shù)綜述[J];計算機(jī)學(xué)報;2011年09期

2 馮登國;可證明安全性理論與方法研究[J];軟件學(xué)報;2005年10期



本文編號:1344825

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/1344825.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶08ee6***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
国产高清视频一区不卡| 欧美日韩在线第一页日韩| 国产a天堂一区二区专区| 国产一区二区久久综合| 亚洲最新的黄色录像在线| 国产精品不卡免费视频| 男人操女人下面国产剧情| 国产成人精品99在线观看| 日本不卡在线视频中文国产| 精品少妇一区二区三区四区| 日韩在线精品视频观看| 午夜精品国产精品久久久| 人妻少妇系列中文字幕| 久久热在线视频免费观看| 儿媳妇的诱惑中文字幕| 在线观看视频成人午夜| 国产丝袜美女诱惑一区二区| 国产成人精品午夜福利av免费| 亚洲a码一区二区三区| 亚洲精品福利视频在线观看| 午夜久久久精品国产精品 | 视频在线播放你懂的一区| 国产三级视频不卡在线观看| 日本丁香婷婷欧美激情| 国产欧美日产久久婷婷| 亚洲在线观看福利视频| 国产一区二区久久综合| 中文字幕熟女人妻视频| 中文字幕熟女人妻视频| 日韩夫妻午夜性生活视频| 国产自拍欧美日韩在线观看| 日本99精品在线观看| 97人妻精品一区二区三区免| 亚洲国产黄色精品在线观看| 视频在线免费观看你懂的 | 黄男女激情一区二区三区| 九九九热在线免费视频| 国产传媒中文字幕东京热| 91久久国产福利自产拍 | 精品日韩av一区二区三区| 免费午夜福利不卡片在线 视频|