计算机应用 ›› 2014, Vol. 34 ›› Issue (5): 1288-1291.DOI: 10.11772/j.issn.1001-9081.2014.05.1288

• 计算机安全 • 上一篇    下一篇

基于适应性选择密文不可区分性的抗辅助输入泄漏公钥加密方案

王占君1,马海英2,3,王金华1   

  1. 1. 南通大学 理学院,江苏 南通 226007
    2. 同济大学 计算机科学与技术系,上海 201804;
    3. 南通大学 计算机科学与技术学院,江苏 南通 226019
  • 收稿日期:2013-11-11 修回日期:2013-12-21 出版日期:2014-05-01 发布日期:2014-05-30
  • 通讯作者: 马海英
  • 作者简介:王占君(1978-),男,河南鹤壁人,讲师,硕士,主要研究方向:密码学、Hopf代数;马海英(1977-),女,河南卫辉人,讲师,博士研究生,主要研究方向:密码学、网络安全;王金华(1963-),男,江苏南通人,教授,博士,主要研究方向:编码密码学、组合设计理论。
  • 基金资助:

    国家自然科学基金资助项目;国家科技支撑计划项目;上海自然科学基金资助项目;江苏省高校自然科学研究项目;南通市科技计划项目

Public key encryption scheme with auxiliary inputs based on indistinguishability under adaptive chosen ciphertext attack

WANG Zhanjun1,MA Haiying2,3,WANG Jinhua1   

  1. 1. School of Science, Nantong University, Nantong Jiangsu 226007, China;
    2. College of Computer Science and Technology, Nantong University, Nantong Jiangsu 226019, China
    3. Department of Computer Science and Technology, Tongji University, Shanghai 201804, China;
  • Received:2013-11-11 Revised:2013-12-21 Online:2014-05-01 Published:2014-05-30
  • Contact: MA Haiying

摘要:

现有的抗辅助输入公钥加密方案仅满足选择明文攻击(IND-CPA)安全性,难以满足实际应用的安全需求。基于判定性Diffie-Hellman (DDH)假设下CS '98加密方案和域GF(q)上Goldreich-Levin定理,构造出一种新型的抗辅助输入泄漏的公钥加密方案。该方案满足适应性选择密文不可区分性(IND-CCA2)安全性,允许攻击者利用辅助输入泄漏信息攻击挑战密文时询问解密预言机。与BHHO加密方案相比,尽管加密/解密运算量都增加了近一倍,却实现了更加严格的IND-CCA2安全性。

Abstract:

The existing public key encryption schemes with auxiliary inputs are impractical since they are only of Indistinguishability under Chosen Plaintext Attack (IND-CPA) security. This paper constructed a novel public-key encryption scheme resilient to auxiliary input leakage, which was based on CS '98 encryption scheme and Goldreich-Levin theorem over large field GF(q). The proposed scheme was based on Indistinguishability under Adaptive Chosen Ciphertext Attack (IND-CCA2) security, allowing an attacker to query decryption oracle with auxiliary input leakage when it tried to attack the challenge ciphertext. Compared with the BHHO (Boneh, Halevi, Hamburg, Ostrovsky) encryption scheme, the proposed scheme realizes the more strict IND-CCA2 security in spite of the encryption's and decryption's overhead being nearly doubled.

中图分类号: