首页> 外文会议>9th ACM workshop on digital rights management 2009 >Attacking cryptographic schemes based on 'perturbation polynomials'
【24h】

Attacking cryptographic schemes based on 'perturbation polynomials'

机译:基于“摄动多项式”攻击密码方案

获取原文
获取原文并翻译 | 示例

摘要

We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use "perturbation polynomials" to add "noise" to polynomialbased systems that offer information-theoretic security, in an attempt to increase the resilience threshold while maintaining efficiency. We show that the heuristic security arguments given for these modified schemes do not hold, and that they can be completely broken once we allow even a slight extension of the parameters beyond those achieved by the underlying information-theoretic schemes.
机译:我们展示了针对最近为实现传感器网络中各种安全目标而提出的几种加密方案的攻击。粗略地说,这些方案都使用“扰动多项式”在提供信息理论安全性的基于多项式的系统中添加“噪声”,以期在保持效率的同时增加弹性阈值。我们表明,为这些修改的方案提供的启发式安全性论据不成立,并且一旦我们允许甚至对基本信息理论方案所实现的参​​数进行稍许扩展,它们就可以被完全破坏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号