您的位置: 专家智库 > >

国家自然科学基金(s60573032)

作品数:5 被引量:10H指数:2
发文基金:国家自然科学基金国家教育部博士点基金国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术电子电信交通运输工程机械工程更多>>

文献类型

  • 5篇中文期刊文章

领域

  • 5篇自动化与计算...
  • 1篇机械工程
  • 1篇电子电信
  • 1篇交通运输工程

主题

  • 2篇CERTIF...
  • 1篇选择密文攻击
  • 1篇杂凑
  • 1篇杂凑函数
  • 1篇私人密钥
  • 1篇签名
  • 1篇签名方案
  • 1篇伪随机
  • 1篇密码
  • 1篇密文
  • 1篇密钥绝缘
  • 1篇密钥托管
  • 1篇加密
  • 1篇加密方案
  • 1篇加密系统
  • 1篇公开密钥
  • 1篇哈希
  • 1篇PASS
  • 1篇SECURI...
  • 1篇WITHOU...

传媒

  • 4篇Journa...
  • 1篇Journa...

年份

  • 1篇2011
  • 3篇2009
  • 1篇2008
5 条 记 录,以下是 1-5
排序方式:
Certificateless key-insulated signature without random oracles被引量:6
2009年
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.
Zhong-mei WANXue-jia LAIJian WENGSheng-li LIUYu LONGXuan HONG
关键词:密钥绝缘签名方案密钥托管私人密钥
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
2009年
To describe the design approaches of IND-CCA2(adaptive chosen ciphertext attack) secure public key encryption schemes systematically,the gaps between different kinds of intractable problems and IND-CCA2 security are studied.This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps.These gaps are categorized,analyzed and measured.Finally the methods to bridge these gaps are described.This explains the existing design approaches and gives aa intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions.
路献辉来学嘉何大可
关键词:选择密文攻击公开密钥加密系统加密方案
On the Security of Multivariate Hash Functions被引量:1
2009年
Multivariate hash functions axe a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations.Billet et al designed the hash function MQ-HASH and Ding et al proposed a similar construction.In this paper,we analyze the security of multivariate hash functions and conclude that low degree multivariate functions such as MQ-HASH are neither pseudo-random nor unpredictable.There may be trivial collisions and fixed point attacks if the parameters of the compression function have been chosen. And they are also not computation-resistance,which makes MAC forgery easily.
罗宜元来学嘉
关键词:杂凑函数伪随机哈希
On Constructing Certificateless Proxy Signature from Certificateless Signature被引量:1
2008年
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
万中美来学嘉翁健洪璇龙宇贾巍巍
关键词:密码
Improved Preimage Attack on 3-Pass HAVAL被引量:2
2011年
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and preimage attacks on 3-pass HAVAL at the complexity of 2 172 and 2 209.6,respectively,as compared to the previous best known results:2 192 and 2 225 by Sasaki et al.in 2008.We extend the skip interval for partial-patching and apply the initial structure technique to find the better message chunks,and combine the indirect-partial-matching,partial-fixing and multi-neutral-word partial-fixing techniques to improve the attacks based on the meet-in-the-middle method.These are the best pseudo-preimage and preimage attacks on 3-pass HAVAL.
钟锦敏来学嘉段明
关键词:HASH
共1页<1>
聚类工具0