公钥密码方案构造及安全证明的知识要点和方法论
公钥密码是现代密码学的重要组成部分, 其研究的难点在于方案构造技巧以及安全证明技巧的双重多样性. 本文首先归纳总结了构造可证明安全的公钥密码方案所需要掌握的知识要点, 包括基本概念、数学基础、简单问题和困难问题、算法、安全模型以及安全归约证明. 这些知识要点是学习方案构造以及安全证明的不可或缺的基础部分, 也是最先需要掌握的部分. 其次, 根据作者自身的学习经历、指导学生的经验以及来自学生的反馈, 本文给出了学习构造可证明安全的公钥密码方案的方法, 包括方案构造学习、安全证明学习以及构造可证明安全密码方案. 我们推荐了30个经典的方案及其证明用于该阶段的练习. 最后, 本文列出了在学习过程中所...
Saved in:
Published in | Journal of Cryptologic Research Vol. 6; no. 1; p. 1 |
---|---|
Main Authors | , , , , , , , , , , , , , , , |
Format | Journal Article |
Language | Chinese |
Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.01.2019
|
Subjects | |
Online Access | Get full text |
ISSN | 2097-4116 |
DOI | 10.13868/j.cnki.jcr.000278 |
Cover
Loading…
Abstract | 公钥密码是现代密码学的重要组成部分, 其研究的难点在于方案构造技巧以及安全证明技巧的双重多样性. 本文首先归纳总结了构造可证明安全的公钥密码方案所需要掌握的知识要点, 包括基本概念、数学基础、简单问题和困难问题、算法、安全模型以及安全归约证明. 这些知识要点是学习方案构造以及安全证明的不可或缺的基础部分, 也是最先需要掌握的部分. 其次, 根据作者自身的学习经历、指导学生的经验以及来自学生的反馈, 本文给出了学习构造可证明安全的公钥密码方案的方法, 包括方案构造学习、安全证明学习以及构造可证明安全密码方案. 我们推荐了30个经典的方案及其证明用于该阶段的练习. 最后, 本文列出了在学习过程中所需要思考与总结的内容, 这些内容是对所掌握的知识与技巧的提炼. 通过反复地思考与总结能够进一步加深对知识与技巧的理解. 希望这些工作能够对读者, 尤其是对基础比较薄弱的读者, 在掌握如何构造可证明安全的公钥密码方案方面起到一定的指引作用. |
---|---|
AbstractList | 公钥密码是现代密码学的重要组成部分, 其研究的难点在于方案构造技巧以及安全证明技巧的双重多样性. 本文首先归纳总结了构造可证明安全的公钥密码方案所需要掌握的知识要点, 包括基本概念、数学基础、简单问题和困难问题、算法、安全模型以及安全归约证明. 这些知识要点是学习方案构造以及安全证明的不可或缺的基础部分, 也是最先需要掌握的部分. 其次, 根据作者自身的学习经历、指导学生的经验以及来自学生的反馈, 本文给出了学习构造可证明安全的公钥密码方案的方法, 包括方案构造学习、安全证明学习以及构造可证明安全密码方案. 我们推荐了30个经典的方案及其证明用于该阶段的练习. 最后, 本文列出了在学习过程中所需要思考与总结的内容, 这些内容是对所掌握的知识与技巧的提炼. 通过反复地思考与总结能够进一步加深对知识与技巧的理解. 希望这些工作能够对读者, 尤其是对基础比较薄弱的读者, 在掌握如何构造可证明安全的公钥密码方案方面起到一定的指引作用. |
Author | Bin-Rui, ZHU WU, Ge 蒋芃 ZHAO, Zhen MU, Yi 郭福春 朱斌瑞 穆怡 SUSILO Willy 赖建昌 赵臻 苏西洛 Jian-Chang, LAI JIANG, Peng 吴戈 Fu-Chun, GUO |
Author_xml | – sequence: 1 givenname: Zhen surname: ZHAO fullname: ZHAO, Zhen – sequence: 2 givenname: Ge surname: WU fullname: WU, Ge – sequence: 3 givenname: LAI surname: Jian-Chang fullname: Jian-Chang, LAI – sequence: 4 givenname: Peng surname: JIANG fullname: JIANG, Peng – sequence: 5 givenname: ZHU surname: Bin-Rui fullname: Bin-Rui, ZHU – sequence: 6 givenname: Yi surname: MU fullname: MU, Yi – sequence: 7 fullname: SUSILO Willy – sequence: 8 givenname: GUO surname: Fu-Chun fullname: Fu-Chun, GUO – sequence: 9 fullname: 赵臻 – sequence: 10 fullname: 吴戈 – sequence: 11 fullname: 赖建昌 – sequence: 12 fullname: 蒋芃 – sequence: 13 fullname: 朱斌瑞 – sequence: 14 fullname: 穆怡 – sequence: 15 fullname: 苏西洛 – sequence: 16 fullname: 郭福春 |
BookMark | eNotjTtLw1AYhs9QwVr7B1ydE893Ts5t1OINCi46l9wKjZLUxO5G2qJFFAqKOGgdKg7SDE71_5wk_RdWdHrh4eF511AljEIfoQ3AJlDJ5VZguuFpxwzc2MQYEyErqEqwEoYFwFdRPUk6DmaMU0ksqKIdPfhcjKc6GxaTNH-c52_X-Ut_cTnR9yM9u9GDjzJL86e74rlfvE7LbFi-p8XVXI9vf-Wvh3L2vY5W2vZZ4tf_t4ZO9naPGwdG82j_sLHdNLpAJBg-9RxhE3A5po4UjsKC8TZVioNFBHaZL4TijGMPFHicgk0tJpXtKO46S0JraPOv242j856fXLSCqBeHy8sWkYqBsARn9AeFlGK- |
ContentType | Journal Article |
Copyright | 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2019. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
DOI | 10.13868/j.cnki.jcr.000278 |
DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Health Research Premium Collection ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Technology Collection ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
GroupedDBID | -SI -S~ 8FE 8FG ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CAJEI CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PB1 PB9 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q-- |
ID | FETCH-LOGICAL-p1281-e3db7a21c603b87b90756f399614270c5e7796560d191d631a34589ab96cb91d3 |
IEDL.DBID | 8FG |
ISSN | 2097-4116 |
IngestDate | Mon Jun 30 15:01:00 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Language | Chinese |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-p1281-e3db7a21c603b87b90756f399614270c5e7796560d191d631a34589ab96cb91d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://www.proquest.com/docview/2895174765?pq-origsite=%requestingapplication% |
PQID | 2895174765 |
PQPubID | 6503834 |
ParticipantIDs | proquest_journals_2895174765 |
PublicationCentury | 2000 |
PublicationDate | 20190101 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – month: 01 year: 2019 text: 20190101 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Beijing |
PublicationPlace_xml | – name: Beijing |
PublicationTitle | Journal of Cryptologic Research |
PublicationYear | 2019 |
Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
SSID | ssib055638241 ssib058688234 |
Score | 2.1584632 |
SecondaryResourceType | review_article |
Snippet | 公钥密码是现代密码学的重要组成部分, 其研究的难点在于方案构造技巧以及安全证明技巧的双重多样性. 本文首先归纳总结了构造可证明安全的公钥密码方案所需要掌握的知识要点, 包括基本概念、数学基础、简单问题和困难问题、算法、安全模型以及安全归约证明. 这些知识要点是学习方案构造以及安全证明的不可或缺的基础部分,... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 1 |
SubjectTerms | Algorithms Cryptography Security |
Title | 公钥密码方案构造及安全证明的知识要点和方法论 |
URI | https://www.proquest.com/docview/2895174765 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS0JBEF9KL12iqOjDxEPX1fe5b98pMjQJkogEb_J29z3KwEzt0ilDpSIKhCI6lB2MDqGHTvb_PD_-i3b1iYeg68xedmeY33zszACwQTClVCIWtBi2oEYkBjGxNcgYtk3MaSoWjcJ7SZRIabtpPe0l3Iret8qxTRwaanZKRY48wgMDMVTZQPpm_gyKrVGiuuqt0JgGfpkjjdBzHN8Z65OYfYWVCdzrGHF_clhoViTTgJosI6-PRuWsSDZMcyfH4SwthEcVuT_2eQg68Tkw63mLoa2ReOfB1MXRAoi61a9Bvem2a71GufvU6b5fd18rg8uG-3Drtm7c6me_Xe4-3_deKr23Zr9d63-Ue1cdt34nDn8_9ls_iyAVjx1uJ6C3CgHmRakL2mIMsqXIFEkqwQbhIa2OHO5ccHRVDInqtmGYYo4O4_EXQ6psqZqOTYuYiBJOUZeAL3eas5dBSFaYxmXiEMehmmlphBmEmJTKyEaUOWwFBMaXznj6XMxMXn_1f_YamOEuhTlKUgSAr1Q4t9c5bJdIcCibIPBHY8n9g18FS63_ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSbJITk42SErUTUyxSNQ1STJI0bVISjXRTUmxSLW0AIoZW4A2Cvv6mXmEmnhFmEYwMayD7YUBLauElYnggjolPxk0Rq4P7BiADlU2NzO1LyjUBd0aBZpdhV2hAUkW3qmV5cAuW7GtpwswflWNjNxcQ5w9dKG3CugWgGaNdFNBJwonGhkmmxkYJ1mYJwF7h6ZmacB6GlhRGZkbJJummptbgo6kSQF2ZVLMjA0TjU1MLSwTkyzNkpOAIsZAc5kZWE1AO1pZGFidXP0CgmApGHTaloURooFhamEGbMGCp7aNDCzNdU0MDc2gO3eMgVL6WXrJedmZelnJRXqQOUCMGgFczbkJMvBD26cKjpAEJcTAVJUhwuD0tHXNy0lLn65ve76g8dm0nc8Wdjyb1_KyYcHT_q6n6zqftq54sb7x2Yy-57Nans9f-mJ924tljc-bdj6d1ANSvHnqi3W7RBlCaRJMYgwsefl5qRIMCoZGKSbAVJCWlJaWbGKZaJKUYp6UZJmcbGiWapackpYiySAD83Q8NAcVxyPiWwq_tDwDp0eIr0-8j6eftzQDF7BBYwkZIpFhYCkpKk2VBTYaSpLkoDGlwJBA68QBAO-S5_Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%85%AC%E9%92%A5%E5%AF%86%E7%A0%81%E6%96%B9%E6%A1%88%E6%9E%84%E9%80%A0%E5%8F%8A%E5%AE%89%E5%85%A8%E8%AF%81%E6%98%8E%E7%9A%84%E7%9F%A5%E8%AF%86%E8%A6%81%E7%82%B9%E5%92%8C%E6%96%B9%E6%B3%95%E8%AE%BA&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=ZHAO%2C+Zhen&rft.au=WU%2C+Ge&rft.au=Jian-Chang%2C+LAI&rft.au=JIANG%2C+Peng&rft.date=2019-01-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=6&rft.issue=1&rft.spage=1&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000278 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |