期刊文献+

可证明安全的基于纠错码的公钥密码体制

Code-based cryptosystem with provable security
下载PDF
导出
摘要 为了构造具有抵抗量子攻击潜力的公钥密码系统,利用纠错码理论构造了一个可证明安全的F-Niederreiter公钥密码体制。通过对现有F-Niederreiter公钥密码体制攻击方法的分析,提出如下命题:若攻击者不能进行解密询问或不能询问密文所对应的部分明文信息,则不存在多项式时间算法可以破解F-Niederreiter加密体制。基于该命题,构造了一个新的F-Nieder-reiter加密方案,并在随机预言模型下证明了其安全性。 To construst a public-key cryptosystem that can resist quantum computers,a provable F-Niederreiter PKC is designed by using error correcting code theory.By means of reviewing currently know attacks to the F-Niederreiter PKC,the assumption that without any decryption oracles or any partial knowledge on the plaintext of the challenge ciphertext,no polynomial-time algorithm can break F-Niederreiter PKC,is obtained.Then,a new F-Niederreiter PKC under the assumption is proposed,and the new F-Niederreiter PKC can be proved,in the random oracle model,to be IND-CCA2 security.
作者 韩牟 张宏
出处 《计算机工程与设计》 CSCD 北大核心 2011年第3期814-817,共4页 Computer Engineering and Design
基金 国家自然科学基金重大项目(90718021) 江苏省自然科学基金项目(BK2007593) 南京理工大学自主科研专项计划基金项目(ZYTS067)
关键词 公钥密码系统 Niederreiter公钥体制 F-度量 可证明安全 抗量子攻击 public-key cryptosystem Niederreiter PKC F-metric provable security resist quantum computers
  • 相关文献

参考文献9

  • 1汤学明,洪帆,崔国华.辫子群上新的难解问题及其密码学应用研究[J].计算机研究与发展,2006,43(7):1246-1251. 被引量:5
  • 2Bemstein D J, Buchmann J. Post-Quantum Cryptography [M]. Heidelberg,Springer,2008:1-245.
  • 3Bhaskar B,Sendrier N.McEliece cryptosystem implementation: theory and practice [C]. Lecture Notes in Computer Science 5299,2008:47-62.
  • 4Catterall N, Gabidulin E M. Public key cryptosystem based merics associated with GRS codes[C]. IEEE International Symposium on Information Theory, 2006:729-733.
  • 5Bernstein D J, Lange T, Peters C. Attacking and defending the Mceliece cryptosystems[C].Lecture Notes in Computer Science 5299,2008:31-46.
  • 6Wieschebrink C.An attack on modified Niederreiter encryption scheme [C]. Lecture Notes in Computer Science 3985,2006: 14-26.
  • 7Wieschebrink C. Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes [C]. Lecture Notes in Computer Science 6061,2010:61-72.
  • 8韩牟,张宏,叶有培,许春根.基于最大F距离码的McEliece公钥密码体制[J].计算机科学,2010,37(4):77-79. 被引量:2
  • 9Dowsley R,Jom Muller-Quade,Anderson C A. Nascimento: A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model[C].CT-RSA,Lec- ture Notes in Computer Science 5473,2009:240-251.

二级参考文献32

  • 1王新梅,李元兴,武传坤.McEliece公钥体制的修正[J].电子学报,1994,22(4):90-92. 被引量:4
  • 2McElience R J.A Public-key Cryptosystem Based on Algebraic Coding Theory[R].Jet Propulsion Lab.DSN Progress Reprot.1978.
  • 3Niederreiter H.Knapsack-Type Cryptosystem and Algebraic Coding Theory[J].ProbL Control Inform.Theory,1986,15(2):159-166.
  • 4Gabidulin E M.Theory of Code with Maximum Rank Distance[J].Problem of Information Tarnsmission,1985,21(1):1-12.
  • 5Gabidulin E M,Paramonov A V.Tretjakov O V.Ideals over a Non-Commutative Ring and their Application in Cryptology[A]//Proceeding of EUROCRYPT'91,Lecture Notes in Computer Science[C].Springer-Verlag,1991:482-489.
  • 6Overbeck R.Structural Attack for Public key Cryptosystems based on Gabidulin Codes[J].Journal of Cryptology,2008,21:280-301.
  • 7Gabidulin E M,Simonis J.Metrics Generated by Families of Subspace[J].IEEE Trans.Inf.Theory,1998,44(5):336-1341.
  • 8Li X Y,Deng R H,Wang X M.On the equivalence of McEliece's and Niederreiter's Public-key Cryptosystems[J].IEEE Transacions on Information Theory,1994,40(1):271-273.
  • 9Canteaut A,Sendrier N.Cryptanalysis of the original McEliece cryptosystem[A]//Proceeding of ASIACRYPT' 98 Lecture Notes in Computer Science[C].Springer-Verlag,1998:187-199.
  • 10Sidelnikov V M.Shetakov S O.On the Cryptosystem Based on Generalized Reed-Solomon Codes[J].Discrete Math,1992,3(3).

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部