首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
无线电   4篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  1990年   1篇
排序方式: 共有4条查询结果,搜索用时 15 毫秒
1
1.
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption. Extending security notions from the public-key setting, we define security in the sense of both indistinguishability and non-malleability against chosen-plaintext and chosen-ciphertext attacks, considering both non-adaptive (i.e., ``lunchtime') and adaptive oracle access (adaptive here refers to an adversary's ability to interact with a given oracle even after viewing the challenge ciphertext). We then characterize the 18 resulting security notions in two ways. First, we construct a complete hierarchy of security notions; that is, for every pair of definitions we show whether one definition is stronger than the other, whether the definitions are equivalent, or whether they are incomparable. Second, we partition these notions of security into two classes (computational or information-theoretic) depending on whether one-way functions are necessary in order for encryption schemes satisfying the definition to exist. Perhaps our most surprising result is that security against adaptive chosen-plaintext attack is (polynomially) equivalent to security against non-adaptive chosen-plaintext attack. On the other hand, the ability of an adversary to mount a (non-adaptive) chosen-plaintext attack is the key feature distinguishing computational and information-theoretic notions of security. These results hold for all security notions considered here.  相似文献   
2.
A matrix key-distribution scheme   总被引:4,自引:0,他引:4  
A new key-distribution scheme is presented. It is based on the distinctive idea that lets each node have a set of keys of which it shares a distinct subset with every other node. This has the advantage that the numbers of keys that must be generated is proportional to the number of nodes. Moreover, two nodes can start a session with virtually no delay. The scheme suits an environment where there is a certain level of trust among the insiders. The security property to an outsider remains identical to that of other existing schemes. Two versions of the scheme are given. Analysis of security and performance shows it is a practical solution to some key-distribution problems.  相似文献   
3.
一种密钥的设计和管理方法   总被引:1,自引:1,他引:0  
文章以近几年公钥密码学研究的热点椭圆曲线密码体制为例。说明密钥数据的结构及其存储问题。所设计的公钥密码系统是一个开放式系统。在用户终端建立私钥库PrKD和公钥库PuKD,产生各种密钥。同时完成数据加解密、签名及验证功能;在密钥服务器上建立一个公钥库SevD,存放密码系统中所有用户的公钥信息。为用户提供公钥发布和交换功能。按照不同的安全性要求,PrKD中的数据要求完全保密。SevD的数据要求防止篡改。  相似文献   
4.
Rao-Nam私钥密码体制的修正   总被引:1,自引:0,他引:1  
该文提出了一种非查表的错误图样生成算法。该算法通过将可纠正的错误矢量的部分信息嵌入到明文消息中,从而得到比原错误矢量具有更大汉明重量的错误图样。用该算法修正的Rao-Nam私钥密码体制高效实用,既无需存储错误图样,又增强了安全性。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号