期刊文献+

对一种双陷门加密体制的分析与改进 被引量:1

Analysis and improvement of a double-trapdoor encryption scheme
下载PDF
导出
摘要 对一种具有双陷门解密机制的公钥概率加密体制的安全性进行分析,指出它存在三点不安全因素,不能抵抗选择密文攻击,攻击者通过选取适当的密文,在得到解密的明文后,能够计算出用户的私钥或分解模数,运用这些信息,攻击者可恢复所有的明文。同时,也对该加密体制作了改进,给出了一种能够抵抗适应性攻击的加密方案,防止攻击者利用获得的解密信息计算用户的私钥或分解模数,提高了加密体制的安全性。 Security analysis of an encryption scheme with a double-trapdoor decryption mechanism was provided, and three insecurities of the encryption scheme were pointed out. It suffers from adaptive chosen ciphertext attacks. By choosing proper ciphertext, the attacker can calculate the user's private key or factorize the modulus after getting the decrypted plaintext. Using this information, the attacker can extract all the plaintexts. An improvement of this encryption scheme against adaptive attack was proposed and can prevent the attacker from calculating the user's private key or factoring the modulus and strengthen its security.
出处 《通信学报》 EI CSCD 北大核心 2004年第11期64-69,共6页 Journal on Communications
基金 国家自然科学重点基金资助项目(69931010)国家"863"基金资助项目(2002AA143021)
关键词 公钥概率加密体制 双陷门解密机制 安全性分析 适应性选择密文攻击 模数分解 probabilistic public-key encryption scheme double trapdoor-decryption security analysis adaptive chosen ciphertext attack modulus factorization
  • 相关文献

参考文献6

  • 1PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A]. Advances in Cryptology-Eurocrypt'99[C].LNCS 1592, Springer-Verlag, 1999. 223-238. 被引量:1
  • 2DAMGARD I, JURIK M. A generalization, a simplification and some application of Paillier's probabilistic public-key system[A].Advances in Cryptology-PKC'99[C]. LNCS 1992, Springer-Verlag, 2001.119-136. 被引量:1
  • 3CATALANO D, GENNARO R, GRAHAM N H. The bit security of Paillier'secryption scheme and its applications[A]. Advances in Cryptology-Eurocrypto'01 [C]. LNCS 2045, Springer-Verlag, 2001. 229-243. 被引量:1
  • 4CATALANO D, GENNARO R, GRAHAM N H, et al. Paillier's cryptosystem revisited[A]. Proc of the 8th CCS, ACM Press[C].New York, 2001. 206-214. 被引量:1
  • 5CRAMER R, SHOUP V. Universal Hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[A].EUROCRYPT '02[C]. LNCS 2332, Springer-Verlag, 2002.45-64. 被引量:1
  • 6BRESSON E, CATALANO D, POINTCHEVAL D. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications[EB/OL]. http://www. di.ens.fr/users/pointche/Documents/Papers/2003_asiacryptB-US.pdf. 被引量:1

同被引文献9

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[J].IEEE Transaction on Information Theory, 1976,22(6): 644-654. 被引量:1
  • 2RIVEST R, SHAMIR A, ADLEMAN L. A method for abstaining digital signatures and public-key cryptosystems[A]. Comm ACM[C].1978. 120-126. 被引量:1
  • 3MULLER S, MULLER W B. The security of public key cryptosystems based on integer factorization[A]. Information Security and Privacy: Third Australasian Conference-ACISP'98[C]. LNCS1438, Springer-Verlag, 1998.9-23. 被引量:1
  • 4SMITH P, LENNON M. LUC: a new public-key system[A].Proceedings of the IFIP TC11, Ninth International Conference on Information Security: Computer Security[C]. 1993. 103-117. 被引量:1
  • 5GONG G, HARN L. Public-key cryptosystems based on cubic finite field extensions[J]. IEEE Transaction on Information Theory, 1998,45(7): 2601-2605. 被引量:1
  • 6GONG G, HARN L, Wu H P. The GH public-key cryptosystem[A].Selected Areas in Cryptography[C]. 2001. 284-300. 被引量:1
  • 7PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A]. Advances in Cryptology-Eurocrypt'99[C].LNCS 1592, Springer-Verlag, 1999. 223-238. 被引量:1
  • 8PAILLIER P. Efficient public-key cryptosystem provably secure against active adversaries[A]. Advances in Cryptology- ASIACRYPT'99[C]. LNCS 1716, Springer-Verlag, 1999. 159-179. 被引量:1
  • 9CATALANO D, GENNARO R, GRAHAM N H. The bit security of Paillier's encryption scheme and its applications[A]. Advances in Cryptology-eurocrypto'01 [C]. LNCS 2045, 2001. 229-243. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部