一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

單雙鑰混合體制的選擇密文安全性

陳原 董慶寬 肖國鎮(zhèn)

陳原, 董慶寬, 肖國鎮(zhèn). 單雙鑰混合體制的選擇密文安全性[J]. 電子與信息學報, 2005, 27(4): 612-616.
引用本文: 陳原, 董慶寬, 肖國鎮(zhèn). 單雙鑰混合體制的選擇密文安全性[J]. 電子與信息學報, 2005, 27(4): 612-616.
Chen Yuan, Dong Qing-kuan, Xiao Guo-zhen . Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption[J]. Journal of Electronics & Information Technology, 2005, 27(4): 612-616.
Citation: Chen Yuan, Dong Qing-kuan, Xiao Guo-zhen . Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption[J]. Journal of Electronics & Information Technology, 2005, 27(4): 612-616.

單雙鑰混合體制的選擇密文安全性

Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption

  • 摘要: 該文主要討論單雙鑰混合體制的選擇密文安全性IND-CCA的定義和相關(guān)結(jié)論。在對兩種不同用途的單雙鑰混合體制及其安全性的研究之后發(fā)現(xiàn)它們的IND-CCA定義中允許敵手訪問的預(yù)言機不同,我們將其統(tǒng)一為:對只能詢問混合體制整體解密機的敵手的安全性,從而統(tǒng)一了混合體制的安全結(jié)論,為正確使用混合體制提供了依據(jù)。我們提出了一種混合體制:REACT+,并證明了其IND-CCA安全性。
  • Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem.Cachin C, Camenisch J eds. Advances in Cryptology - Eurocrypt 2004 Proceedings. Berlin: Springer-Verlag, 2004, LNCS Vol.3027: 171 - 188.[2]Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform. Advances in CryptologyCrypto2001. Berlin: Springer Verlag, 2001, LNCS Vol.2020:159- 175.[3]Bellare M, Desai A, D. Pointcheval, et al.. Relations among notions of security for public-key encryption schemes. Advances in Cryptology-Crypt98. Berlin: Springer-Verlag, 1998, LNCS Vol.1462:26 - 45.[4]Bellare M, Sahai A, Jokipii E, et al.. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation.Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, Miami Beach, Florida, 1997:394 - 403.[5]Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encrption scheme. Advances in CryptologyCrypto99. Berlin: Springer Verlag, 1999, LNCS Vol.1666:537 - 554.[6]Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First Annual Conference on Computer and Communications Security, New York, ACM, 1993:62 - 73.[7]Bellare M, Rogaway P. Optimal asymmetric encryption: How to encrypt with RSA. Advances in Cryptology-Eurocrpt94. Berlin:Springer Verlag, 1994, LNCS Vol. 950:92 - 111.[8]Crammer R, Shoup V. A pratical public key cryptosystem provably secure against adaptive chosen ciphertext attack. H.Krawczyk ed. Advances in Cryptology-Crypto98 Proceedings,Berlin: Springer Verlag, 1998, LNCS Vol.1462:13 - 25.[9]Elkind E, Sahai A. A unified methodology for constructing public-key encryption schemes secure against adaptive chosen-ciphertext attack, available at iacr. org/2002/042.ps.gz.2002.
  • 加載中
計量
  • 文章訪問數(shù):  2376
  • HTML全文瀏覽量:  120
  • PDF下載量:  774
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2003-08-25
  • 修回日期:  2004-07-19
  • 刊出日期:  2005-04-19

目錄

    /

    返回文章
    返回