期刊文献+

抗选择密文攻击公钥密码体制的研究 被引量:3

Study of Public Key Encryption Secure Against Chosen Ciphertext Attacks
下载PDF
导出
摘要 抗选择密文攻击公钥密码体制是安全性很高的密码体制,它是设计抗主动攻击的协议非常有用的工具。总结该体制的构造与应用的主要研究成果,并指出了几个值得进一步研究的问题。 The public key eryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary. This paper surveys the main results about its construction and applications available in the literature, The authors also point out some important problems that deserve to be further studied.
出处 《计算机应用研究》 CSCD 北大核心 2006年第2期19-21,30,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60302015) 信息安全国家重点实验室2004年第一批开放课题(01-01)
关键词 加密 选择密文安全性 密码协议 Encryption Chosen Ciphertext Security Cryptography Protocol
  • 相关文献

参考文献36

  • 1M Abdalla, M Bellare, P Rogaway. The Oracle Diffie-Helhnan Assumptions and an Analysis nf DHIES[C]. Berlin: Springer-Verlag,Topics in Cryptology CT-RSA 2001, 2001 . 143-158.
  • 2N Asokan, V Shonp, M Waidner. Optimistic Fair Exchange of Digital Signatures[J]. IEEE Journal on Selected Areas in Communications,2000, 18(4) :593-610.
  • 3J Baek, R Steinfeld, Y Zheng. Formal Proofs for the Security of Signcryption [M]. Berlin: Springer-Verlag, Public Key Cryptography,2002. 81-98.
  • 4M Bellare, R Canelli, H Krawczyk. A Modular Approach to the Design and Analysis of Authenlicali.n and Key Exchange Protocols[C].New York: ACM. the 30th Annual ACM Symposium on Theory of Computing, 1998. 419-428.
  • 5M Bellare, A Desai, D Pointcheval, et al, Relations Among Notions of Security for Public Key Encryplion Schemes [C]. Berlin : SpringerVerlag, Advances in Cryptnlogy CRYFFO' 98, 1998.26-45.
  • 6M Bellare, D Pointcheval, P Rogaway, Authenticated Key Exchange Secure Against Dictionary Attacks[C]. Berlin: Springer-Verlag, Advances in Cryptology - Proceedings of EUROCRYPT 2000, 2000.139-155.
  • 7M Bellare, P Rogaway. Entity Authentication and Key Distribution[C]. Berlin: Sprlnger-Verlag, Advances in Cryplology CRYPTO'93, 1994. 232-249.
  • 8M Bellare, P Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols[C]. New York: ACM, the 1st ACM Conference on Computer and Communications Security, 1993.62-73.
  • 9M Bellare, P Rogaway. Optimal Asymmetrie Enecryption[C]. Berlin:Springer-Verlag, Advances in Cryptology-EUROCRYPT'94, 1994.92-111.
  • 10D Boneh, X Boyen. Efficient Selective-lD Secure Identity Based Encryptiou Without Random Oracles [C]. Berlin : Springer-Verlag, Advances in Cryptology EUROCRYVT 2004, 2004. 223-238.

同被引文献25

  • 1张文政.公钥密码体制可证明安全性的几点注记[J].信息安全与通信保密,2005,27(7):125-127. 被引量:4
  • 2刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 3彭翔,张鹏,位恒政,于斌.双随机相位加密系统的已知明文攻击[J].物理学报,2006,55(3):1130-1136. 被引量:22
  • 4王泽辉.二维随机矩阵置乱变换的周期及在图像信息隐藏中的应用[J].计算机学报,2006,29(12):2218-2225. 被引量:20
  • 5[1]REFREGIER P,JAVIDI B.Optical image encryption based on input plane and Fourier plane random encoding[J].Optical Letter,1995,15(10):2629-2638.
  • 6[2]CARNICER A,MONTES-USATEGUI M,ARCOS S,et al.Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J].Optical Letter,2005,30:1644-1646.
  • 7[3]FRAUEL Y,CASTRO A,NAUGHTON T J,et al.Security analysis of optical encryption:Unmanned/Unattended Sensors and Sensor NetworkⅡ.CARAPEZZA E M.Proceeding of SPIE[C].[s.l.]:[s.n.],2005:25-34.
  • 8[4]GOPINATHAN U,MONAGHAN D S,NAUGHTON T J,et al.A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J].Optics Express,2006,14(8):3181-3186.
  • 9[6]GOPINATHAN U,MONAGHAN D S,NAUGHTON T J,et al.Strengths and weaknesses of optical encryption algorithms:18th Annual Meeting of the IEEE Lasers and Elecctro-Optics Society,Sydney,Australia,2005[C].Sydney:[s.n,],2005,951-952.
  • 10[7]JAVIDI B.Optical and Digital Techniques for information security[M].[s.l.]:Springer Verlag,2005.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部