2013 06 v.18;No.105 1-10
密码学综述
基金项目(Foundation):
国家自然科学基金资助项目(60170249,61272037);;
陕西省自然科学基金资助项目(2013JZ020);;
教育部博士点基金资助项目(20100073110060)
邮箱(Email):
DOI:
10.13682/j.issn.2095-6533.2013.06.017
中文作者单位:
西安邮电大学无线网络安全技术国家工程实验室;
摘要(Abstract):
由密码学的基本概念出发,介绍密码学及其应用的最新发展状况,包括公钥密码体制及其安全理论、各种密码协议及其面临的攻击,并对安全协议的分析方法进行概述。根据当今的发展状况指出密码学的发展趋势和未来的研究方向。
关键词(KeyWords):
信息安全;;密码学;;数字签名;;公钥密码体制;;私钥密码体制
7,068 | 159 | 69 |
下载次数 | 被引频次 | 阅读次数 |
参考文献
[1]Shannon C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,27(4):656-715.
[2]Diffie W,Hellman M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[3]Hohenberger S,Sahai A,Waters B.Full domain hash from(leveled)multilinear maps and identity-based aggregate signatures[C]//Advances in Cryptology-CRYPTO’13.Berlin:Springer-Verlag,2013:494-512.
[4]Bellare M,Namprempre C,Neven G.Security proofs for identity-based identification and signature schemes[J].Journal of Cryptology,2009,22(1):1-61.
[5]Bellare M,Kiltz E,Peikert C.Identity-Based(lossy)trapdoor functions and applications[C]//Advances in Cryptology EUROCRYPT’12.Berlin:Springer-Verlag,2012:228-245.
[6]王育民,刘建伟.通信网的安全:理论与技术[M].西安:西安电子科技大学出版社,1999:231-232.
[7]郑东,李祥学,黄征.密码学:密码算法与协议[M].北京:电子工业出版社,2009:45-46.
[8]Stehle D,Steinfeld R.Making NTRU as secure as worstcase problems over ideal lattices[C]//Advances in Cryptology EUROCRYPT’11.Berlin:Springer,2011:27-47.
[9]Cho J Y.Linear cryptanalysis of reduced-round PRESENT[C]//Topics in Cryptology-CT-RSA’10.Berlin:Springer,2010:302-317.
[10]Biham E,Shamir A.Differential cryptanalysis of DESlike cryptosystems[C]//Advances in Cryptology CRYPTO’90.Berlin:Springer-Verlag,1991:63-72.
[11]Biham E,Shamir A.Differential cryptanalysis of FEAL and N-hash[C]//Advances in Cryptology EUROCRYPT’91.Berlin:Springer-Verlag,1991:1-16.
[12]Biham E,Shamir A.Differential cryptanalysis of snefru,khafre,REDOC,LOKI,and lucifer[C]//Advances in Cryptology-CRYPTO’91.Berlin:SpringerVerlag,1992:156-171.
[13]Biham E,Shamir A.Differential fault analysis of secret key cryptosystems[C]//Advances in Cryptology CRYPTO’97.Berlin:Springer-Verlag,1997:513-525.
[14]Odlyzko A M.Discrete logarithms in finite fields and their cryptographic significance[C]//Advances in Cryptology EUROCRYPT’84.Berlin:Springer-Verlag,1985:224-314.
[15]McEliece R J.A public key cryptosystem based on algebraic coding theory[R]//Deep Space Network Progress Report Jet Propulsion Laboratory.California:California Institute of Technology,1978:42-44.
[16]Shamir A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO’84.Berlin:Springer-Verlag.1985:47-53.
[17]Bellare M,Waters B,Yilek S.Identity-based encryption secure against selective opening attack[C]//Theory of Cryptography.Berlin:Springer-Verlag.2011:235-252.
[18]Wolf C,Preneel B.Taxonomy of public key schemes based on the problem of multivariate quadratic equations.Manuscript,E-Print Archive[EB/OL].(2005-05-12)[2003-10-08].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.2940&rep=rep1&type=pdf.
[19]Patarin J.Hidden fields equations(HFE)and isomorphisms of polynomials(IP):Two new families of asymmetric algorithms[C]//Advances in Cryptology EUROCRYPT’96.Berlin:Springer-Verlag,1996:33-48.
[20]Brakerski Z,Goldwasser S.Circular and leakage resilient public-key encryption under subgroup indistinguishability[C]//Advances in Cryptology CRYPTO’10.Berlin:Springer-Verlag,2010:1-20.
[21]Dodis Y,Wichs D.Non-malleable extractors and symmetric key cryptography from weak secrets[C]//Proceedings of the 41st annual ACM symposium on Theory of computing.New York:ACM,2009:601-610.
[22]Goldwasser S,Micali S.Probabilistic encryption[J].Journal of Computer and System Sciences,1984,28(2):270-299.
[23]Dolev D,Dwork C,Naor M.Non-malleable cryptography[C]//Preliminary Version in Proceedings of the23rd Annual Symmposium on the Theory of Computing.New York:ACM,1991:1-24.
[24]Bellare M,Rogaway P.Entity Authentication and key distribution CRYPTO’93[C]//Advances in Cryptology.Berlin:Springer-Verlag,1993:110-125.
[25]Mashatan A,Ouafi K.Forgery-resilience for digital signature schemes[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security.New York:ACM,2012:24-25.
[26]Chaum D,Van H E.Group Signatures[C]//Advances in Cryptology-EUROCRYPT’91.Berlin:SpringerVerlag,1991:257-265.
[27]Aguilar M C,Cayrel P,Gaborit P,et al.A new efficient threshold ring signature scheme based on coding theory[J].IEEE Transactions on Information Theory,2009,57(7):4833-4842.
[28]Wen Xiaojun,Chen Yongzhi,Fang Junbin.An interbank E-payment protocol based on quantum proxy blind signature[J].Quantum Information Processing,1013,12(1):549-558.
[29]Fujisaki,Eiichiro.Sub-linear size traceable ring signatures without fandom oracles[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2012,95(1):151-166.
[30]Boldyreva A,Palacio A,Warinschi B.Secure proxy signature schemes for delegation of signing rights[J].Journal of Cryptology,2012,25(1):57-115.
[31]Verma G K.A Proxy Blind Signature Scheme over Braid Groups[J].IJ Network Security,2009,0(3):214-217.
[32]Lu S,Ostrovsky R,Sahai A,et al.Sequential aggregate signatures,multisignatures,and verifiably encrypted signatures without random oracles[J].Journal of Cryptology,2013,26(1):1-34.
[33]Zhang Lei,Zhang futai,Wu qianhong.Delegation of signing rights using certificateless proxy signatures[J].Information Sciences,2012,184(1):198-309.
[34]Zheng Dong,Li Xiangxue,Chen Kkefei.Code-based ring signature scheme[J].International Journal of Network Security,2007,5(2):154-157.
[35]Zheng Dong,Victor K W,Chen Kefei.A GDH groupbased signature scheme with linkability[J].J IEE Communications,2006,153(5):539-644.
[36]Zheng Dong,Li Xiangxue,Chen Kefei.LFSR-based ring signature scheme[J].Chinese Journal of Electronics,2007,16(3):397-400.
[37]Sahai A,Waters B.Fuzzy identity-based encryption[C]//Advances in Cryptology EUROCRYPT’05.Berlin:Springer-Verlag,2005:457-473.
[38]Dodis Y,Kanukurthi B,Katz J,et al.Robust fuzzy extractors and authenticated key agreement from close secrets[J].IEEE Transactions on Information Theory,2012,58(9):6207-6222.
[39]Burrows M,Abadi M,Needham R M.A logic of authentication[J].Mathematical and Physical Sciences,1989,426(1871):233-271.
[40]Fabrega F T,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C]//Proceedings of IEEE Symposium on Security and Privacy.New York:IEEE,1998:160-171.
[41]Boneh D,Sahai A,Waters B.Functional encryption:a new vision for public-key cryptography[J].Communications of the ACM,2012,55(11):56-64.
[42]Akinyele J A,Pagano M W,Green M D,et al.Securing electronic medical records using attribute-based encryption on mobile devices[C]//Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices.New York:ACM,2011:75-86.
[43]Luo Song,Hu Jianbin,Chen Zhong.Ciphertext policy attribute-based proxy re-encryption[C]//Proceedings of the International Conference on Information and communications Security,ICICS’10.Berlin:SpringerVerlag,2010:401-415.
[44]Zhang Yinghui,Chen Xiaofeng,Li Jin,et al.Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 8th ACM SIGSAC symposium on Information,computer and communications security.New York:ACM,2013:511-516.
[45]Chase M,Chow S S.Improving privacy and security in multi-authority attribute-based encryption[C]//Proceedings of the 16th ACM conference on Computer and communications security,CCS’09.New York:ACM,2009:121-130.
[2]Diffie W,Hellman M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[3]Hohenberger S,Sahai A,Waters B.Full domain hash from(leveled)multilinear maps and identity-based aggregate signatures[C]//Advances in Cryptology-CRYPTO’13.Berlin:Springer-Verlag,2013:494-512.
[4]Bellare M,Namprempre C,Neven G.Security proofs for identity-based identification and signature schemes[J].Journal of Cryptology,2009,22(1):1-61.
[5]Bellare M,Kiltz E,Peikert C.Identity-Based(lossy)trapdoor functions and applications[C]//Advances in Cryptology EUROCRYPT’12.Berlin:Springer-Verlag,2012:228-245.
[6]王育民,刘建伟.通信网的安全:理论与技术[M].西安:西安电子科技大学出版社,1999:231-232.
[7]郑东,李祥学,黄征.密码学:密码算法与协议[M].北京:电子工业出版社,2009:45-46.
[8]Stehle D,Steinfeld R.Making NTRU as secure as worstcase problems over ideal lattices[C]//Advances in Cryptology EUROCRYPT’11.Berlin:Springer,2011:27-47.
[9]Cho J Y.Linear cryptanalysis of reduced-round PRESENT[C]//Topics in Cryptology-CT-RSA’10.Berlin:Springer,2010:302-317.
[10]Biham E,Shamir A.Differential cryptanalysis of DESlike cryptosystems[C]//Advances in Cryptology CRYPTO’90.Berlin:Springer-Verlag,1991:63-72.
[11]Biham E,Shamir A.Differential cryptanalysis of FEAL and N-hash[C]//Advances in Cryptology EUROCRYPT’91.Berlin:Springer-Verlag,1991:1-16.
[12]Biham E,Shamir A.Differential cryptanalysis of snefru,khafre,REDOC,LOKI,and lucifer[C]//Advances in Cryptology-CRYPTO’91.Berlin:SpringerVerlag,1992:156-171.
[13]Biham E,Shamir A.Differential fault analysis of secret key cryptosystems[C]//Advances in Cryptology CRYPTO’97.Berlin:Springer-Verlag,1997:513-525.
[14]Odlyzko A M.Discrete logarithms in finite fields and their cryptographic significance[C]//Advances in Cryptology EUROCRYPT’84.Berlin:Springer-Verlag,1985:224-314.
[15]McEliece R J.A public key cryptosystem based on algebraic coding theory[R]//Deep Space Network Progress Report Jet Propulsion Laboratory.California:California Institute of Technology,1978:42-44.
[16]Shamir A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO’84.Berlin:Springer-Verlag.1985:47-53.
[17]Bellare M,Waters B,Yilek S.Identity-based encryption secure against selective opening attack[C]//Theory of Cryptography.Berlin:Springer-Verlag.2011:235-252.
[18]Wolf C,Preneel B.Taxonomy of public key schemes based on the problem of multivariate quadratic equations.Manuscript,E-Print Archive[EB/OL].(2005-05-12)[2003-10-08].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.2940&rep=rep1&type=pdf.
[19]Patarin J.Hidden fields equations(HFE)and isomorphisms of polynomials(IP):Two new families of asymmetric algorithms[C]//Advances in Cryptology EUROCRYPT’96.Berlin:Springer-Verlag,1996:33-48.
[20]Brakerski Z,Goldwasser S.Circular and leakage resilient public-key encryption under subgroup indistinguishability[C]//Advances in Cryptology CRYPTO’10.Berlin:Springer-Verlag,2010:1-20.
[21]Dodis Y,Wichs D.Non-malleable extractors and symmetric key cryptography from weak secrets[C]//Proceedings of the 41st annual ACM symposium on Theory of computing.New York:ACM,2009:601-610.
[22]Goldwasser S,Micali S.Probabilistic encryption[J].Journal of Computer and System Sciences,1984,28(2):270-299.
[23]Dolev D,Dwork C,Naor M.Non-malleable cryptography[C]//Preliminary Version in Proceedings of the23rd Annual Symmposium on the Theory of Computing.New York:ACM,1991:1-24.
[24]Bellare M,Rogaway P.Entity Authentication and key distribution CRYPTO’93[C]//Advances in Cryptology.Berlin:Springer-Verlag,1993:110-125.
[25]Mashatan A,Ouafi K.Forgery-resilience for digital signature schemes[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security.New York:ACM,2012:24-25.
[26]Chaum D,Van H E.Group Signatures[C]//Advances in Cryptology-EUROCRYPT’91.Berlin:SpringerVerlag,1991:257-265.
[27]Aguilar M C,Cayrel P,Gaborit P,et al.A new efficient threshold ring signature scheme based on coding theory[J].IEEE Transactions on Information Theory,2009,57(7):4833-4842.
[28]Wen Xiaojun,Chen Yongzhi,Fang Junbin.An interbank E-payment protocol based on quantum proxy blind signature[J].Quantum Information Processing,1013,12(1):549-558.
[29]Fujisaki,Eiichiro.Sub-linear size traceable ring signatures without fandom oracles[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2012,95(1):151-166.
[30]Boldyreva A,Palacio A,Warinschi B.Secure proxy signature schemes for delegation of signing rights[J].Journal of Cryptology,2012,25(1):57-115.
[31]Verma G K.A Proxy Blind Signature Scheme over Braid Groups[J].IJ Network Security,2009,0(3):214-217.
[32]Lu S,Ostrovsky R,Sahai A,et al.Sequential aggregate signatures,multisignatures,and verifiably encrypted signatures without random oracles[J].Journal of Cryptology,2013,26(1):1-34.
[33]Zhang Lei,Zhang futai,Wu qianhong.Delegation of signing rights using certificateless proxy signatures[J].Information Sciences,2012,184(1):198-309.
[34]Zheng Dong,Li Xiangxue,Chen Kkefei.Code-based ring signature scheme[J].International Journal of Network Security,2007,5(2):154-157.
[35]Zheng Dong,Victor K W,Chen Kefei.A GDH groupbased signature scheme with linkability[J].J IEE Communications,2006,153(5):539-644.
[36]Zheng Dong,Li Xiangxue,Chen Kefei.LFSR-based ring signature scheme[J].Chinese Journal of Electronics,2007,16(3):397-400.
[37]Sahai A,Waters B.Fuzzy identity-based encryption[C]//Advances in Cryptology EUROCRYPT’05.Berlin:Springer-Verlag,2005:457-473.
[38]Dodis Y,Kanukurthi B,Katz J,et al.Robust fuzzy extractors and authenticated key agreement from close secrets[J].IEEE Transactions on Information Theory,2012,58(9):6207-6222.
[39]Burrows M,Abadi M,Needham R M.A logic of authentication[J].Mathematical and Physical Sciences,1989,426(1871):233-271.
[40]Fabrega F T,Herzog J C,Guttman J D.Strand spaces:why is a security protocol correct[C]//Proceedings of IEEE Symposium on Security and Privacy.New York:IEEE,1998:160-171.
[41]Boneh D,Sahai A,Waters B.Functional encryption:a new vision for public-key cryptography[J].Communications of the ACM,2012,55(11):56-64.
[42]Akinyele J A,Pagano M W,Green M D,et al.Securing electronic medical records using attribute-based encryption on mobile devices[C]//Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices.New York:ACM,2011:75-86.
[43]Luo Song,Hu Jianbin,Chen Zhong.Ciphertext policy attribute-based proxy re-encryption[C]//Proceedings of the International Conference on Information and communications Security,ICICS’10.Berlin:SpringerVerlag,2010:401-415.
[44]Zhang Yinghui,Chen Xiaofeng,Li Jin,et al.Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 8th ACM SIGSAC symposium on Information,computer and communications security.New York:ACM,2013:511-516.
[45]Chase M,Chow S S.Improving privacy and security in multi-authority attribute-based encryption[C]//Proceedings of the 16th ACM conference on Computer and communications security,CCS’09.New York:ACM,2009:121-130.
基本信息:
DOI:10.13682/j.issn.2095-6533.2013.06.017
中图分类号:TN918.1
引用信息:
[1]郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(06):1-10.DOI:10.13682/j.issn.2095-6533.2013.06.017.
基金信息:
国家自然科学基金资助项目(60170249,61272037);; 陕西省自然科学基金资助项目(2013JZ020);; 教育部博士点基金资助项目(20100073110060)
暂无数据