基于新“0”测试参数的理想格上多线性映射
发布时间:2018-12-17 21:44
【摘要】:密码学中的多线性映射具有广泛应用,包括多方密钥交换、广播加密、基于身份的加密、基于属性的加密、不可区分模糊器和函数加密等.虽然多线性映射存在无限应用的可能,但目前多线性映射构造方案仅有三个——GGH13、CLT13和GGH15,且它们都存在"0"化攻击、新的难度假设和可信安装的安全问题.针对第一个多线性映射候选构造方案GGH13,Hu和Jia最近基于"0"化攻击提出了攻击GGH13构造的多项式时间算法,完全破解了基于GGH13映射的两个重要应用——多方密钥交换协议(MPKE)和使用3-精确覆盖问题的证据加密方案(WE).本文主要改进理想格上的GGH13构造方案,以解决其存在的"0"化攻击和可信安装的安全问题.首先,为避免"0"化攻击问题,作者通过设计新的"0"测试参数提出基于新随机化方法的多线性映射构造,其安全性基于新的困难问题假设——ext-GDDH/ext-GCDH;其次,为去除可信安装问题,作者使用中国剩余定理提出无可信安装的理想格上多线性映射构造,其安全性基于新的困难问题假设——wots-ext-GCDH/wots-ext-GDDH;最后,作者给出基于改进多线性映射构造的多方密钥交换协议nr-MPKE和wots-MPKE.
[Abstract]:Multi-linear mapping in cryptography has a wide range of applications, including multi-party key exchange, broadcast encryption, identity-based encryption, property-based encryption, indistinguishable ambiguity and function encryption. Although there is a possibility of infinite application of multilinear mappings, there are only three schemes for constructing multilinear mappings at present-GGH13,CLT13 and GGH15, both of which have "zero" attacks, new difficulty assumptions and security problems of trusted installation. For the first candidate construction scheme of multilinear mapping, GGH13,Hu and Jia, a polynomial time algorithm is proposed to attack GGH13 construction based on the "0" attack recently. Two important applications based on GGH13 mapping are completely cracked: Multi-party key exchange protocol (MPKE) and evidence encryption scheme (WE).) using 3-precision coverage problem. This paper mainly improves the GGH13 construction scheme on ideal lattice to solve the security problems of "0" attack and trusted installation. First of all, in order to avoid the "0" attack problem, the author designs a new "0" test parameter to construct the multilinear mapping based on the new randomization method. Its security is based on the assumption of a new difficult problem, ext-GDDH/ext-GCDH;. Secondly, in order to remove the trusted installation problem, the author uses the Chinese residue theorem to construct the multilinear mapping on ideal lattice without trusted installation. Its security is based on the assumption of a new difficult problem, wots-ext-GCDH/wots-ext-GDDH;. Finally, the author gives the multi-party key exchange protocols nr-MPKE and wots-MPKE. based on the improved multilinear mapping.
【作者单位】: 江苏理工学院计算机工程学院 中国科学院信息工程研究所信息安全国家重点实验室
【基金】:国家自然科学基金(61672270,61602216) 教育部人文社会科学研究项目(14YJAZH023,15YJCZH129) 中国科学院信息安全国家重点实验室开放课题面上项目(2015-MSB-10) 江苏省“青蓝工程”中青年学术带头人项目(KYQ14004) 江苏省高校优秀中青年教师和校长境外研修计划 常州市应用基础研究指导性项目(2016365)资助~~
【分类号】:TN918.1
本文编号:2384837
[Abstract]:Multi-linear mapping in cryptography has a wide range of applications, including multi-party key exchange, broadcast encryption, identity-based encryption, property-based encryption, indistinguishable ambiguity and function encryption. Although there is a possibility of infinite application of multilinear mappings, there are only three schemes for constructing multilinear mappings at present-GGH13,CLT13 and GGH15, both of which have "zero" attacks, new difficulty assumptions and security problems of trusted installation. For the first candidate construction scheme of multilinear mapping, GGH13,Hu and Jia, a polynomial time algorithm is proposed to attack GGH13 construction based on the "0" attack recently. Two important applications based on GGH13 mapping are completely cracked: Multi-party key exchange protocol (MPKE) and evidence encryption scheme (WE).) using 3-precision coverage problem. This paper mainly improves the GGH13 construction scheme on ideal lattice to solve the security problems of "0" attack and trusted installation. First of all, in order to avoid the "0" attack problem, the author designs a new "0" test parameter to construct the multilinear mapping based on the new randomization method. Its security is based on the assumption of a new difficult problem, ext-GDDH/ext-GCDH;. Secondly, in order to remove the trusted installation problem, the author uses the Chinese residue theorem to construct the multilinear mapping on ideal lattice without trusted installation. Its security is based on the assumption of a new difficult problem, wots-ext-GCDH/wots-ext-GDDH;. Finally, the author gives the multi-party key exchange protocols nr-MPKE and wots-MPKE. based on the improved multilinear mapping.
【作者单位】: 江苏理工学院计算机工程学院 中国科学院信息工程研究所信息安全国家重点实验室
【基金】:国家自然科学基金(61672270,61602216) 教育部人文社会科学研究项目(14YJAZH023,15YJCZH129) 中国科学院信息安全国家重点实验室开放课题面上项目(2015-MSB-10) 江苏省“青蓝工程”中青年学术带头人项目(KYQ14004) 江苏省高校优秀中青年教师和校长境外研修计划 常州市应用基础研究指导性项目(2016365)资助~~
【分类号】:TN918.1
【相似文献】
相关期刊论文 前1条
1 叶茂;胡学先;刘文芬;;基于理想格的近似平滑投射Hash函数[J];信息工程大学学报;2013年01期
相关博士学位论文 前1条
1 刘亮;线性映射在安全协议中的应用研究[D];西安电子科技大学;2016年
相关硕士学位论文 前4条
1 孙荣辛;理想格问题的局部—整体算法研究[D];大连理工大学;2015年
2 赛炜;基于理想格的公钥密码中模多项式的应用研究[D];西安电子科技大学;2014年
3 彭巧;基于多线性映射的秘密共享研究[D];贵州大学;2017年
4 孙意如;格签名&签密方案的设计与实现[D];山东科技大学;2017年
,本文编号:2384837
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2384837.html