999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

國產(chǎn)商用公鑰密碼專欄序言(中英文)

2021-12-07 08:54:11黃欣沂何德彪
密碼學(xué)報(bào) 2021年4期

翁 健, 黃欣沂, 何德彪

1. 暨南大學(xué), 廣州510632

2. 福建師范大學(xué) 計(jì)算機(jī)與網(wǎng)絡(luò)空間安全學(xué)院, 福州350117

3. 武漢大學(xué) 國家網(wǎng)絡(luò)安全學(xué)院, 武漢430072

密碼是國家的重要戰(zhàn)略資源, 直接關(guān)系國家政治安全、經(jīng)濟(jì)安全、國防安全和信息安全. 根據(jù)2020 年1 月1 日正式施行的《中華人民共和國密碼法》, 密碼分為核心密碼、普通密碼和商用密碼. 核心密碼、普通密碼用于保護(hù)國家秘密信息, 屬于國家秘密; 商用密碼用于保護(hù)不屬于國家秘密的信息, 公民、法人和其他組織可以依法使用商用密碼保護(hù)網(wǎng)絡(luò)與信息安全. 由國家密碼管理局組織, 我國自主設(shè)計(jì)的基于橢圓曲線公鑰密碼算法SM2、密碼雜湊算法SM3、分組密碼算法SM4、序列密碼算法祖沖之(ZUC)、標(biāo)識密碼算法SM9 等商用密碼已成為國家標(biāo)準(zhǔn), 有效保障了國家網(wǎng)絡(luò)與信息安全.

雖然國產(chǎn)商用密碼實(shí)現(xiàn)了“從無到有” 的跨越式發(fā)展, 但其設(shè)計(jì)初衷是滿足網(wǎng)絡(luò)與信息系統(tǒng)的共性基礎(chǔ)安全需求. 隨著信息化進(jìn)程不斷推進(jìn), 越來越多的敏感服務(wù)開始陸續(xù)上線, 衍生出滲漏免疫、匿名認(rèn)證、雙盲認(rèn)證、多人共享、不可誹謗等新型安全需求, 亟需依托已有的國產(chǎn)商用密碼, 開展功能型密碼的研究,為網(wǎng)絡(luò)與信息系統(tǒng)繼續(xù)提供有效的安全服務(wù).

本期《密碼學(xué)報(bào)》組織“國產(chǎn)商用公鑰密碼” 專欄, 主要針對國產(chǎn)商用密碼中的SM2、SM9 等公鑰密碼算法, 根據(jù)網(wǎng)絡(luò)與信息系統(tǒng)的新型安全需求, 結(jié)合其發(fā)展現(xiàn)狀, 小規(guī)模地展示我國學(xué)者近期在該領(lǐng)域的研究進(jìn)展. 本專欄共收錄4 篇論文, 分別簡介如下:

論文《SM2 密碼算法密鑰滲漏分析》, 針對國產(chǎn)商用密碼算法使用過程中易遭受一系列不同動(dòng)機(jī)的分析和攻擊問題, 選取SM2 數(shù)字簽名算法和公鑰加密算法作為分析對象, 提出兩種高效難檢測的密鑰滲漏攻擊: (1) 針對SM2 數(shù)字簽名算法, 密鑰滲漏攻擊者能夠根據(jù)兩個(gè)連續(xù)的數(shù)字簽名成功還原完整簽名私鑰; (2) 針對SM2 公鑰加密算法, 密鑰滲漏攻擊者可根據(jù)當(dāng)前的密文成功預(yù)測下一次加密的會話密鑰, 從而具備解密密文的能力. 因此, SM2 面臨的密鑰滲漏威脅比目前已知的通用攻擊更嚴(yán)重. 針對發(fā)現(xiàn)的高效攻擊, 本文探討了適用于SM2 的抗密鑰滲漏技術(shù), 保障SM2 數(shù)字簽名算法和SM2 公鑰加密算法的安全性.

論文《基于SM2 的多接收方公鑰加密方案》, 針對網(wǎng)絡(luò)與信息系統(tǒng)單發(fā)送者—多接收者的數(shù)據(jù)安全共享需求, 基于SM2 公鑰加密算法提出一種隨機(jī)數(shù)可重用的多接收方公鑰加密方案, 并在隨機(jī)預(yù)言機(jī)模型下證明方案滿足IND-CCA 安全性. 此方案能夠在多用戶開放網(wǎng)絡(luò)環(huán)境保護(hù)數(shù)據(jù)隱私, 所使用的隨機(jī)數(shù)重用技術(shù)能夠有效減少發(fā)送方計(jì)算量, 極大地提高加密算法效率.

論文《基于SM2 數(shù)字簽名算法的環(huán)簽名方案》, 針對網(wǎng)絡(luò)與信息系統(tǒng)的匿名認(rèn)證和國產(chǎn)自主化需求,基于SM2 數(shù)字簽名算法提出環(huán)簽名方案、可鏈接環(huán)簽名方案以及兩種變型, 并證明環(huán)簽名方案滿足正確性、不可偽造性和無條件匿名性, 可鏈接環(huán)簽名方案滿足正確性、不可偽造性、無條件匿名性、可鏈接性和不可誹謗性, 最后通過性能評估說明幾種方案的通信量和計(jì)算量均與環(huán)成員數(shù)量呈線性關(guān)系.

論文《基于SM9 標(biāo)識密碼算法的環(huán)簽名方案》, 針對標(biāo)識體系環(huán)簽名具有匿名保護(hù)和避免繁瑣公鑰證書管理的特點(diǎn), 基于SM9 標(biāo)識數(shù)字簽名算法構(gòu)造一種基于標(biāo)識的環(huán)簽名方案, 此方案與SM9 的用戶簽名密鑰生成方式具有一致性, 并在隨機(jī)諭言機(jī)模型下證明此方案具有不可偽造性和匿名性, 最后通過效率分析說明了方案的簽名計(jì)算開銷和通信代價(jià)比現(xiàn)有方案少, 具有更強(qiáng)的實(shí)用性.

希望本專欄能夠讓更多國內(nèi)學(xué)者關(guān)注國產(chǎn)商用密碼的分析與設(shè)計(jì).

Cryptography is an important strategic resource of a country, which is directly related to national security including political, economic, national defense, and information security. The Cryptography Law of the People’s Republic of China has been inplemented since January 1, 2020. Accordingly, cryptography is classified into core,common,and SM cryptographies. The core and common cryptographies are used to protect national classified information (i.e. state secrets), and the SM cryptography is to protect other information but not state secrets. Citizens, legal persons, and other organizations may use the SM cryptography to protect network and information security lawfully. Organized by the State Cryptography Administration, Chinese independent SM crypto algorithms (e.g. elliptic curve public key cryptography SM2, cryptography hash algorithm SM3, block cipher algorithm SM4, stream cipher algorithm ZUC, and identity-based cryptography algorithm SM9) have become the national standard,effectively guaranteeing the national network and information security.

While SM crypto algorithms have achieved a leapfrogging development from scratch, their original intention is to meet the basic security requirements of network and information systems (NIS).With the continuous advancement of the informatization process, more and more sensitive services are provided online. This has derived various security requirements such as leakage immunity, anonymous authentication, double-blind authentication, sharing among multiple users, and non-slanderability. It is urgent to carry out the research on functional cryptographies from existing SM crypto algorithms,such that providing continuous and effective security services for NIS.

This special column titled “SM Public-Key Cryptography”, organized by Journal of Cryptologic Research, mainly focuses on public-key cryptography algorithms such as SM2 and SM9 in Chinese SM cryptography, aiming at collecting state-of-the-art research progress of Chinese scholars in this field, according to the new security requirements of networks and information systems, and combined with its development status. This special column includes four papers, they are briefly summarized as follows.

The paper titled “Key Exfiltration on SM2 Cryptographic Algorithms” discusses the vulnerability of SM crypto algorithms to various cryptoanalyses and attacks with different motivations. This paper primarily investigates the security of the SM2 cryptographic algorithms against key exfiltration attacks and proposes two effective while undetectable attacks on the signature and public-key encryption scheme of the SM2. The first attack is on the SM2 signature scheme, which enables the attacker to recover the secret key from two successive signatures. The second attack is on the SM2 public-key encryption scheme,which enables the attacker to successfully predicate the current session key from the previous ciphertext hence to recover the plaintext. The attacks show that the impact of key exfiltration attacks on the SM2 cryptographic algorithms could be much more effective than other known attacks.Further discussion on effective approaches to enhance the security of SM2 encryption and signature schemes against the proposed key exfiltration attacks is presented.

The paper titled “SM2-Based Multi-Recipient Public-Key Encryption” focuses on the secure data sharing requirement among one sender and multiple receivers in NIS.This paper proposes a randomness re-using multi-recipient public-key encryption(RR-MRPKE)scheme based on SM2 encryption scheme,and proves that it is IND-CCA secure (in the sense of MRPKE) in the random oracle model. The proposed scheme provides data privacy in open networks,and the employing technology of randomness re-using can effectively reduce the amount of computation and improve the encryption efficiency.

The paper titled “Ring Signature Schemes Based on SM2 Digital Signature Algorithm” considers the requirements of anonymity authentication and Chinese independence in NIS. This paper proposes a ring signature scheme and a linkable ring signature scheme based on SM2 digital signature algorithm,as well as two variations of SM2 linkable ring signature scheme. It is shown that, SM2 ring signature scheme satisfies correctness, unforgeability, and unconditional anonymity. SM2 linkable ring signature scheme is with correctness,unforgeability,unconditional anonymity,linkability,and non-slanderability.The final efficiency analysis demonstrates that the communication costs and computation costs of these designed schemes are respectively linear with the number of ring members.

The paper titled “An Identity-Based Ring Signature Scheme for SM9 Algorithm” finds that the identity-based cryptographic system owns anonymity protection and avoids the complex public key certificate management. This paper constructs an identity-based ring signature scheme based on SM9 signature scheme, which has the consistence of the user private key generation algorithm to the SM9 signature scheme. Moreover, this paper proves that the proposed ring signature scheme satisfies the unforgeability and anonymity under the random oracle model. The final efficiency analysis shows that the proposed scheme is with less computation costs and communication overheads than existing schemes, and hence owns the stronger utility.

Hope this special issue may attract more researchers to focus on the cryptoanalysis and design of SM crypto algorithms.

主站蜘蛛池模板: 麻豆国产精品视频| 亚洲床戏一区| 欧美日韩在线国产| 国产美女叼嘿视频免费看| 国产91丝袜| 国产成人亚洲精品色欲AV| 国产精品19p| 亚洲日本韩在线观看| 美女裸体18禁网站| 99re免费视频| 美女无遮挡免费视频网站| 国产午夜人做人免费视频中文| 茄子视频毛片免费观看| 91久久精品日日躁夜夜躁欧美| 欧美亚洲国产一区| 精久久久久无码区中文字幕| www.日韩三级| 国产一区二区三区在线观看视频 | 99久久精品美女高潮喷水| 激情综合婷婷丁香五月尤物| 久久久久亚洲AV成人网站软件| 99精品影院| 亚洲首页在线观看| 亚洲美女视频一区| 91黄视频在线观看| 成人午夜亚洲影视在线观看| 亚州AV秘 一区二区三区| 亚洲 日韩 激情 无码 中出| 亚洲Av综合日韩精品久久久| 欧美一区二区啪啪| 亚洲一区二区无码视频| 国产精品网拍在线| 国产精品99久久久| 国产欧美在线观看视频| 亚洲国产精品一区二区高清无码久久| 国产精女同一区二区三区久| 亚洲性视频网站| 狠狠做深爱婷婷综合一区| 91免费观看视频| 久久无码av一区二区三区| 人人看人人鲁狠狠高清| 中国一级毛片免费观看| 亚洲中文在线看视频一区| 国产成人综合亚洲网址| 国产特级毛片aaaaaaa高清| 精品人妻无码中字系列| 女人18一级毛片免费观看| 97青青青国产在线播放| 亚洲综合九九| 宅男噜噜噜66国产在线观看| 四虎永久在线视频| 在线另类稀缺国产呦| 伊人久久影视| 亚洲成a人在线播放www| 国产成人高清在线精品| 99视频在线看| 午夜国产理论| 国产黄网永久免费| 色综合天天娱乐综合网| 国产丝袜第一页| 国产激爽爽爽大片在线观看| 国产老女人精品免费视频| 亚洲欧美精品一中文字幕| 国产在线一区二区视频| 亚洲av片在线免费观看| 亚洲中文字幕国产av| 国产一区二区视频在线| 国产主播福利在线观看| 露脸真实国语乱在线观看| 亚洲国产成人久久精品软件| 亚洲国产成人自拍| 67194在线午夜亚洲| 九九热精品视频在线| 国产一区三区二区中文在线| 色亚洲激情综合精品无码视频| 亚洲福利网址| 91亚洲精选| 欧美高清国产| 美女扒开下面流白浆在线试听 | 高潮毛片无遮挡高清视频播放| 亚洲人成日本在线观看| 国产精品林美惠子在线播放|