全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

辅助输入安全的损耗陷门函数的构造

DOI: 10.13190/j.jbupt.2014.06.002, PP. 6-10

Keywords: 密码学,损耗陷门函数,辅助输入安全,可证明安全

Full-Text   Cite this paper   Add to My Lib

Abstract:

通过对损耗陷门函数的分析得知,在关于陷门的任意计算不可求逆的函数提前泄露的情况下,已有损耗陷门函数的可证明安全性将会受到较大的影响.如何保证损耗陷门函数在此应用场景下仍然是可证明安全的,是一个有意义的研究问题.为此,首先使用d线性假设,构造了一个新的损耗陷门函数,并利用扩展版的Goldreich-Levin定理,证明其是辅助输入安全的;其次通过对Peikert所构造的利用错误学习问题假设的损耗陷门函数进行适当的修改,也能证明其是辅助输入安全的;最后从效率和安全性角度出发,对2个损耗陷门函数进行了分析.

References

[1]  Peikert C, Waters B. Lossy trapdoor functions and their applications[C]//Cynthia Dwork (Ed.). Proceedings of STOC 2008. Victoria, British Columbia, Canada: ACM, 2008: 187-196.
[2]  Mol P, Yilek S. Chosen-ciphertext security from slightly lossy trapdoor functions[C]//Phong Q Nguyen, David Pointcheval (Eds.). Proceedings of PKC 2010: LNCS 6056. Paris, France: Springer, 2010: 296-377.
[3]  Freeman D M, Goldreich O, Kiltz E, et al. More constructions of lossy and correlation-secure trapdoor functions[C]//Phong Q Nguyen, David Pointcheval (Eds.). Proceedings of PKC 2010: LNCS 6056. Paris, France: Springer, 2010: 279-295.
[4]  Hofheinz D. All-but-many lossy trapdoor functions[C]//David Pointcheval, Thomas Johansson (Eds.). Proceedings of EUROCRYPT 2012: LNCS 7237. Cambridge, UK: Springer, 2012: 209-227.
[5]  Hemenway B, Ostrovsky R. Extended-DDH and lossy trapdoor functions[C]//Marc Fischlin, Johannes Buchmann, Mark Manulis (Eds.). Proceedings of PKC 2012: LNCS 7293. Darmstadt, Germany: Springer, 2012: 627-643.
[6]  Dodis Y, Kalai Y T, Lovett S. On cryptography with auxiliary input[C]//Michael Mitzenmacher (Ed.). Proceedings of STOC 2009. Bethesda, MD, USA: ACM, 2009: 621-630.
[7]  Dodis Y, Goldwasser S, Kalai Y, et al. Public key encryption schemes with auxiliary inputs[C]//Henri Gilbert (Ed.). Proceedings of EUROCRYPT 2010: LNCS 5978. French Riviera: Springer, 2010: 361-381.
[8]  Goldwasser S, Kalai Y, Peikert C, et al. Robustness of the learning with errors assumption[C]//Andrew Chi-Chih Yao (Eds.). Proceedings of ICS 2010. Beijing, China: Tsinghua University, 2010: 230-240.
[9]  Brakerski Z, Segev G. Better security for deterministic public encryption: the auxiliary-input setting[C] //Phillip Rogaway (Ed.). Proceedings of CRYPTO 2011: LNCS 7073. Santa Barbara, CA, USA: Springer, 2011: 543-560.
[10]  Regev O. On lattices, learning with errors, random linear codes, and cryptography[C]//Harold N Gabow, Ronald Fagin (Eds.). Proceedings of STOC 2005. Baltimore, Maryland, USA: ACM, 2005: 84-93.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133