期刊文献+

基于Chebyshev的概率公钥密码体制

Probabilistic public-key cryptosystem based on Chebyshev
下载PDF
导出
摘要 介绍了Chebyshev多项式的定义和相关性质,针对确定性Chebyshev多项式公钥密码体制进行了研究,发现其不能抵抗选择密文攻击。结合抵抗选择密文攻击的安全模型,提出了基于有限域的Chebyshev多项式的概率公钥密码体制,分析结果表明该密码体制是正确的。通过归约证明,该密码体制能够抵挡适应性选择密文攻击,具有抵抗选择密文攻击的IND-CCA2安全性。 This paper introduced the definition and the properties of Chebyshev polynomial. According to the deterministic public-key cryptosystem of Chebyshev polynomial, found that it couldn' t resist chosen cipher-text attacks. Combining with the security model against chosen cipher-text attacks, this paper proposed the probabilistic public-key cryptosystem of Chebyshev polynomial. The analysis show that the proposed cryptosystem is correct. Through the result of the reduction proof, the pro- posed cryptosystem can resist the adaptive chosen cipher-text attacks and has the IND-CCA2 security.
出处 《计算机应用研究》 CSCD 北大核心 2013年第9期2772-2775,2779,共5页 Application Research of Computers
关键词 CHEBYSHEV多项式 公开密钥密码体制 选择密文攻击 IND—CCA2安全性 Chebyshev polynomial public-key cryptosystem chosen cipher-text attacks IND-CCA2 security
  • 相关文献

参考文献10

二级参考文献132

  • 1王大虎,魏学业,柳艳红.Chebyshev多项式的公钥加密和身份认证方案的研究[J].北京交通大学学报,2005,29(5):40-42. 被引量:5
  • 2刘亮,刘云,宁红宙.公钥体系中Chebyshev多项式的改进[J].北京交通大学学报,2005,29(5):56-59. 被引量:11
  • 3王大虎,魏学业,李庆九,柳艳红.基于Chebyshev多项式的公钥加密和密钥交换方案的改进[J].铁道学报,2006,28(5):95-98. 被引量:3
  • 4Kocarev L, Makraduli J, Amato E Public-key Encryption Based on Chebyshev Maps[C]//Proceedings of the International Symposium on Circuits and Systems. [S. l.]: IEEE Press, 2003.
  • 5Kocarev L, Sterjev M, Fekete A, et al. Public-key Encryption with Chaos[J]. Chaos, 2004, 14(4): 1078-1082.
  • 6Bergamo P, D'Aroc P, De Santis A, et al. Security of Public Key Cryptosystems Based on Chebyshev Polynomials[C]//Proceedings of the International Symposium on Circuits and Systems. [S. l.]: IEEE Press, 2005,
  • 7Zhao Geng, Chen Guanrong, Lu Fangfang. Analysis of Some Recently Proposed Chaos-based Public Key Encryption Algorithms[C]//Proc. of 2006 International Conference on Communicationsl Circuits and Systems. [S. l.]: IEEE Press, 2006.
  • 8DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory, 1976,22(6) : 644-654.
  • 9RIVEST R L, SHAMIR A, ADLEMAN L M. A method for obtaining digital signatures and public-key cryptosystems [ J ] Communications of the ACM, 1978,21 (2) :120-126.
  • 10ELGAMAL T. A public key cryptasystem and signature scheme based on discrete logarithms[J]. IEEE Trans on Information Theory, 1985,31 (4) :469-472.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部