首页> 外文学位 >The new security bounds and leakage-resilient models for encryption schemes.
【24h】

The new security bounds and leakage-resilient models for encryption schemes.

机译:用于加密方案的新的安全边界和防泄漏模型。

获取原文
获取原文并翻译 | 示例

摘要

One of the earliest and most important tasks in cryptography is to encode messages in a way that only authorized parties can read them. Encryption is the process of doing so. In an encryption scheme, an encryption key and a decryption key are first generated. Given the encryption key and a message m, the encryption scheme generates the encoded message: the ciphertext C. Given decryption key and a ciphertext C, the encryption scheme can recover the original message.;In this thesis, we study some problems about security bounds and leakage-resilient models for encryption schemes, by showing tighter security bounds for encryption schemes, devising efficient constructions in the existing security models and proposing more powerful security models:;PKCS v1.5 is a long-standing and a widely used standard that defines a set of encryption schemes. Ciphertext Indistinguishability under Chosen Plaintext Attack (IND-CPA) is one of the most popular security definitions for public key encryption. In this thesis, first, we show the encryption scheme in PKCS ;Second, we consider securely updating encryption keys in a security co-processor where information could be leaked to an attacker periodically. We devise a leakage-resilient key evolution scheme to address the problem. Our construction can update keys in a near-linear time in n, where n is the length of key. Previous work on this problem updates keys in time theta(n2). Our security analysis uses new results on the connectivity of random graphs.;Third, we consider the auxiliary input attacker has some information about the decryption key. Previous work only considered public-key encryption (PKE) in this model. In this thesis, we devise the first secure identity-based encryption (IBE) construction in this model. IBE is more flexible than PKE in the choice of public keys. This makes it much more useful, but harder to achieve. We also extend the auxiliary model to a stronger model by allowing the attackers to have some information about the randomness that is used to generate ciphertexts. This new model is important as in some cases (e.g., cloud computing), the randomness used by encryptors (e.g., data owners) is weak. We devise secure IBE and PKE constructions in this new model.
机译:加密中最早也是最重要的任务之一就是以一种只有授权方才能阅读的方式对消息进行编码。加密就是这样做的过程。在加密方案中,首先生成加密密钥和解密密钥。在给定加密密钥和消息m的情况下,加密方案将生成编码后的消息:密文C。在给定解密密钥和密文C的情况下,加密方案可以恢复原始消息。通过显示更严格的加密方案安全边界,在现有安全模型中设计有效的结构并提出更强大的安全模型,来实现加密方案和具有防泄漏能力的模型:PKCS v1.5是一个长期存在且被广泛使用的标准,它定义了一组加密方案。选定的纯文本攻击下的密文不可区分性(IND-CPA)是公钥加密最流行的安全性定义之一。在本文中,首先,我们展示了PKCS中的加密方案;其次,我们考虑了在安全协处理器中安全地更新加密密钥,在安全协处理器中,信息可能会定期泄露给攻击者。我们设计了一种防泄漏弹性密钥演变方案来解决该问题。我们的构造可以在n的近似线性时间内更新密钥,其中n是密钥的长度。关于此问题的先前工作更新了时间theta(n2)中的键。我们的安全性分析使用有关随机图的连通性的新结果。第三,我们认为辅助输入攻击者具有有关解密密钥的一些信息。在此模型中,以前的工作仅考虑了公钥加密(PKE)。在本文中,我们设计了该模型中的第一个基于身份的安全加密(IBE)结构。在选择公钥时,IBE比PKE更灵活。这使它更有用,但更难实现。通过允许攻击者掌握一些用于生成密文的随机性信息,我们还将辅助模型扩展为更强的模型。这种新模型很重要,因为在某些情况下(例如,云计算),加密器(例如,数据所有者)使用的随机性较弱。我们在这种新模型中设计了安全的IBE和PKE结构。

著录项

  • 作者

    Zhang, Ye.;

  • 作者单位

    The Pennsylvania State University.;

  • 授予单位 The Pennsylvania State University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 92 p.
  • 总页数 92
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号