期刊文献+

投影对C^(*-)体制对称性的破坏

Break of the C^(*-) Scheme Symmetry Caused by Projection
下载PDF
导出
摘要 SFLASH体制是配上具体参数的C*-体制,已被Dubois等用差分攻击方法成功地攻破.文中分析了Dubois等对SFLASH体制所用的攻击方法,说明该攻击能成功的关键主要是依赖于SFLASH体制的对称性,并对C*-体制的对称性进行了研究,严格证明了投影能够破坏C*-体制的对称性.该结果表明,在SFLASH体制上应用投影方法可以有效地抵抗差分攻击. The SFLASH cryptographic scheme is a C*-scheme with specific parameters.It has been broken by Dubois et al with differential cryptanalytic attacks.This paper reviews the basic attacks to the SFLASH scheme,and points out that a successful attack mainly depends on the symmetry of the SFLASH scheme.Moreover,the symmetry of the C*-scheme is investigated,and the fact that projection can break the symmetry of the C*-scheme is also strictly proved.The results indicate that the SFLASH scheme with projection can effectively withstand diffe-rential attacks.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期86-89,共4页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"973"计划项目(2007CB311201) 国家自然科学基金资助项目(60970119 60803149)
关键词 密码 公钥密码 多项式 映射 多变量 对称性 投影 C*-体制 cryptography public key cryptography polynomials mapping multivariate symmetry projection C*-scheme
  • 相关文献

参考文献14

  • 1Ding J,Gower J E,Schmidt D S.Multivariate public key cryptosystems[M].New York:Springer,2006:2-3. 被引量:1
  • 2李明祥,韩伯涛,朱建勇,郑雪峰,闫鹏.在标准模型下安全的基于身份的代理签名方案[J].华南理工大学学报(自然科学版),2009,37(5):118-122. 被引量:13
  • 3王鑫,刘景美,王新梅.多变量签名模型的改进[J].北京邮电大学学报,2009,32(5):124-127. 被引量:9
  • 4Matsumoto T,Imai H.Public quadratic polynominal-tuples for efficient signature-verification and message-encryption[C] ∥Advances in Cryptology-Eurocrypt'1988.Berlin-Heidelberg:Springer-Verlag,1988:419-453. 被引量:1
  • 5Patarin J.Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'1988[C] ∥Advances in Cryptology-Crypto'1995.Berlin-Heidelberg:Springer-Verlag,1995:248-261. 被引量:1
  • 6Patarin J,Goubin L,Courtois N.C*-+ and HM:variations around two schemes of T.Matsumoto and H.Imai[C] ∥Advances in Cryptology-Asiacrypt'1998.Berlin-Heidelberg:Springer-Verlag,1998:35-49. 被引量:1
  • 7Patarin J,Courtois N,Goubin L.FLASH,a fast multiva-riate signature algorithm[C] ∥Topics in Cryptology-CT-RSA'2001.Berlin-Heidelberg:Springer-Verlag,2001:297-307. 被引量:1
  • 8Gilbert H,Minier M.Cryptanalysis of SFLASH[C] ∥Advances in Cryptology-Eurocrypt'2002.Berlin-Heidelberg:Springer-Verlag,2002:288-298. 被引量:1
  • 9Dubois V,Fouque P A,Stern J.Cryptanalysis of SFLASH with slightly modified parameters[C] ∥Advances in Cryptology-Eurocrypt'2007.Berlin-Heidelberg:Springer-Verlag,2007:264-275. 被引量:1
  • 10Dubois V,Fouque P A,Shamir A,et al.Practical crypt-analysis of SFLASH[C] ∥Advances in Cryptology-Crypto'2007.Berlin-Heidelberg:Springer-Verlag,2007:1-12. 被引量:1

二级参考文献23

  • 1王鑫,张美玲,王新梅.高次MFE多变量加密方案[J].四川大学学报(工程科学版),2009,41(4):171-175. 被引量:6
  • 2温巧燕,高飞,朱甫臣.量子密钥分发中身份认证问题的研究现状及方向[J].北京邮电大学学报,2004,27(5):1-6. 被引量:11
  • 3Huang X, Susilo W, Mu Y, et al. Proxy signature without random oracles [ C] //Proceedings of International Conferenee on Mobile Ad Hoe and Sensor Networks. Berlin/ Heidelberg: Springer-Verlag ,2006:473-484. 被引量:1
  • 4Waters B. Efficient identity-based encryption without random oracles [ C ]//Proceedings of Eurocrypt. Berlin/ Heidelberg: Springer-Verlag,2005 : 114-127. 被引量:1
  • 5Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model [ C ]//Proceedings of the 11 th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg:Springer-Verlag, 2006:207-222. 被引量:1
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ] //Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag, 1984:47-53. 被引量:1
  • 7Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ]//Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag,2001:213-229. 被引量:1
  • 8Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York : ACM, 1996:48-57. 被引量:1
  • 9Kim S, Park S, Won D. Proxy signatures, revisited [ C ]// Proceedings of International Conference on Information and Communications Security. Berlin/Heidelberg: Springer-Verlag, 1997 : 223- 232. 被引量:1
  • 10Zhang F, Kim K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C ]//Proceedings of the 8th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg: Springer-Verlag, 2003: 312-323. 被引量:1

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部