Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model  

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model

在线阅读下载全文

作  者:Qiqi LAI Yuan CHEN Yupu HU Baocang WANG Mingming JIANG 

机构地区:[1]State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China

出  处:《Frontiers of Computer Science》2014年第3期469-477,共9页中国计算机科学前沿(英文版)

基  金:Acknowledgements This work was supported by the National Natural Science Foundation of China (Grant Nos. 61173151, 61173152) and the Fundamental Research Funds for the Central Universities (K5051270003).

摘  要:Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks.Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encrypfion, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks.

关 键 词:symmetric encryption key-dependent message challenge function universal hash function ideal cipher model 

分 类 号:TP311.52[自动化与计算机技术—计算机软件与理论] TP309[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象