ICISC2011-note1

本文探讨了密码学中各类难题的设计原理与应用,包括不可伪造性、非并行化特性等,并介绍了几种典型的安全谜题如RSA谜题、基于哈希的谜题等。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

adversarial model

INDistingushability 

分辨率

under chosen ciphertext attacks

back up

scheme

IND-CPA encryption

verifiability

schemes considering sa and ND

non-delegatable schemes

pkzip compression algorithm

12 bytes input 

bk94 

stay in fse01

ciphertext-only attack

PRNG

focus only on his attack algorithm

biham and 

bk94 attack process

guess some bit 

early step: 6 bits

find some bits of k[1] and kk1[1]

side-channels

relation between 

stay01 bk94 


synthetic linear analysis 

on bias analysis


CubeHash preliminaries

The EVITA hardware Security Module

software layers 

meadows

puzzles  proof of work

signatures

cookies

rechability

moderately hard puzzles based on this 


easy to generate

hard to solve 

easy to verify 

computation bound or memory bound 

former.


tuple of algorithms


puzzle security properties


difficulty

unforgeability: hard for the adversary to generate valid puzzles


non-parallelizability :非常重要


tuneable difficulty

useful puzzles: the work done in solving a puzzle can be used for another target.


HASH-based puzzle (Juels-Brainard)


merits: generation and verification very efficient


time-lock puzzles of Rivest-Shamir-Wagner (RSW)


choose random a 

puzzle consists of (n,a,q)


Karame-Capkun puzzle

 (ESORIS 2010)


BPV Generator

Pre-processing run once...

whenever a pari .. is needed..


a new non-parallelisable puzzle (RSA puz)


setup genuz findsoln versoln

rsw puz kc puz rsa puz



a new 














评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值