期刊文献+

CCA安全的抗连续泄露的广播密钥封装机制 被引量:1

Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security
下载PDF
导出
摘要 传统公钥基础设施中的证书复杂管理和身份基密码体制中的密钥托管等问题在基于证书的密码体制下得到了很好的解决,因此无证书密码体制近年来得到了广泛关注.此外,在现实应用中,攻击者基于冷启动、边信道等各种各样的泄露攻击获得密码机制内部敏感状态(如秘密钥等)的泄露信息,导致在传统理想模型下被证明安全的密码机制不再具有相应的安全性.此外,由于广播通信模式具有较高的消息通信效率,多个具有广播通信功能的密码原语相继被提出.针对基于证书密钥封装机制对泄露容忍性和广播通信等性能的需求,提出抗泄露的基于证书的广播密钥封装机制的实例化构造,并基于判定的Diffie-Hellman困难性假设对其选择密文攻击下的安全性进行了证明.此外,为进一步增强该构造的实用性,研究了广播密钥封装机制的连续泄露容忍性,通过定期更新用户密钥的方式实现了对连续泄露攻击的抵抗目标.与现有工作的分析对比表明,该构造在保证安全性可证明的基础上,不仅实现了抵抗泄露攻击和广播通信的功能,而且拥有较高的计算效率. Certificate-based cryptography which is attracted great interest can solve the certificate management issue of the traditional public-key cryptography system,at the same time,which can also avoid the key escrow in the identity-based cryptography,thus,it has attracted attention of cryptography researchers.The traditional security models assume that any adversary cannot obtain the leakage information on the internal secret states,such as secret keys,however,some leakage can be leaked through various leakage attacks in the actual environment.In addition,many cryptographic schemes with broadcast communication function were created,because broadcast communication has higher efficiency of message transmission.To further provide leakage resilience and broadcast communication for certificate-based broadcast key encapsulation mechanism(CB-BKEM),a concrete construction of CB-BKEM is proposed,and the leakage-resilient chosen-ciphertext attacks security is proved based on decisional Diffie-Hellman assumption.To further improve the practicability of CB-BKEM,continuous leakage-resilient CB-BKEM is researched,and the continuous leakage resilience of CB-BKEM can be obtained by performing key update.The performance analysis shows that the proposed construction has higher computational efficiency while maintaining the provable security,the leakage resilience and the broadcast communication.
作者 乔子芮 杨启良 周彦伟 杨波 夏喆 张明武 QIAO Zi-Rui;YANG Qi-Liang;ZHOU Yan-Wei;YANG Bo;XIA Zhe;ZHANG Ming-Wu(School of Computer Science,Shaanxi Normal University,Xi’an 710062,China;Guangxi Key Laboratory of Cryptography and Information Security(Guilin University of Electronic Technology),Guilin 541004,China;State Key Laboratory of Cryptology,Beijing 100878,China;School of Computer Science and Technology,Wuhan University of Technology,Wuhan 430070,China)
出处 《软件学报》 EI CSCD 北大核心 2023年第2期818-832,共15页 Journal of Software
基金 国家重点研发计划(2017YFB0802000) 国家自然科学基金(62272287,61802242,U2001205) 广西密码学与信息安全重点实验室研究课题(GCIS202108) 河南省网络密码技术重点实验室研究课题(LNCT2021-A04)。
关键词 基于证书的密钥封装机制 广播通信 连续泄露容忍性 选择密文攻击 certificate-based key-encapsulation mechanism broadcast communication continuous leakage resilience chosen-ciphertext attacks
  • 相关文献

参考文献7

二级参考文献52

  • 1Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 2003,33(1): 167-226. [doi: 10.1137/S0097539702403773]. 被引量:1
  • 2Kurosawa K, Desmedt Y. A new paradigm of hybrid encryption scheme. In: Franklin M, ed. Proc. of the CRYPTO 2004. LNCS 3152, Berlin, Heidelberg: Springer-Verlag, 2004. 426-442. 被引量:1
  • 3Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Denning D, Pyle R, Ganesan R, eds. Proc. of the 1st ACM Conf. on Computer and Communication Security. New York: ACM Press, 1993.62-73. [doi: 10.1145/168588.168596]. 被引量:1
  • 4Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D, ed. Proc. of the CT-RSA 2001. LNCS 2020, Berlin, Heidelberg: Springer-Verlag, 2001.159-174. 被引量:1
  • 5Shoup V. Using hash functions as a hedge against chosen ciphertext attack. In: Preneel B, ed. Proc. of the EUROCRYPT 2000. LNCS 1807, Berlin, Heidelberg: Springer-Verlag, 2000. 275-288,. 被引量:1
  • 6Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In: Wiener M, ed. Proc. of the CRYPTO'99. LNCS 1666, Berlin, Heidelberg: Springer-Verlag, 1999. 537-554. 被引量:1
  • 7Abe M, Gennaro R, Kurosawa K, Shoup V. Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In: Cramer R, ed. Proc. of the EUROCRYPT 2005. LNCS 3494, Berlin, Heidelberg: Springer-Verlag, 2005. 128-146. [doi: 10.1007/s00145-007-9010-x]. 被引量:1
  • 8Bjorstad TE, Dent AW. Building better signcryption schemes with tag-KEMs. In: Yung M, et al, eds. Proc. of the PKC 2006. LNCS 3958, Berlin, Heidelberg: Springer-Verlag, 2006.491-507. [doi: 10.1007/11745853_32]. 被引量:1
  • 9Yoshida M, Fujiwara T. On the security of Tag-KEM for signcryption. Electronic Notes in Theoretical Computer Science, 2007, 171(1):83-91. [doi: 10.1016/j.entcs.2006.11.011]. 被引量:1
  • 10Huang Q, Wong DS. Generic certificateless key encapsulation mechanism. In: Pieprzyk J, Ghodosi H, Dawsom E, eds. Proc. of the ACISP 2007. LNCS 4586, Berlin, Heidelberg: Springer-Verlag, 2007.215-229. 被引量:1

共引文献8

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部