Journal of Cryptologic Research
 
Citation Search Quick Search DOI Advanced
  Author Center
   » Submission Online
   » Instruction for Authors
   » Template
   » Copyright Agreement
  Peer Review
   » Peer Review
   » Our peer-review policy
Journal Online
   » Accepted
   » In Press
   » Current Issue
   » Earlier Issues
   » View by Fields
   » Top Downloaded
   » RSS
 

2017, 4(1)
HighLights More»   
· A Survey on the Intersection of Cryptography and Game Theory——PENG C G, TIAN Y L, LIU H, DING H F
· Debug and Analysis on Fully Homomorphic Cryptography——LU S Q, WANG S F, HAN X, CHENG Q F
· An Algorithm of Large Capacity Webpage Information Hiding Based on the Class Attribute——DU Y G, XUE F
· A Transformed BF-IBE Scheme with Adaptive Security in the Standard Model——WANG X Q, XUE R
· On Linear Properties of G Function in NORX——CHENG W, GUAN J
Current Issue Accepted Earlier Issues Top Read Top Downloaded Top Cited
  Journal of Cryptologic Research--2017, 4 (1)   Published: 28 February 2017
Select | Export to EndNote
A Survey on the Intersection of Cryptography and Game Theory Hot!
PENG C G, TIAN Y L, LIU H, DING H F
Journal of Cryptologic Research. 2017, 4 (1): 1-15. ;  doi: 10.13868/j.cnki.jcr.000158
Full Text: HTML (1 KB)  PDF (706 KB)  ( 287 )
Show Abstract ( 132 )

Rational cryptography is an emerging direction of the cross-discipline of cryptography and game theory. Game theory provides an opportunity to reach some secure goals in cryptography. In view of the fact that traditional cryptography only considers honest participants or malicious participants, starting with the similarity of game theory and cryptography, this paper first discusses basic research ideas of rational cryptography, and formalizes its game models and concepts based on introduction of selfish participants. This paper further introduces the security of rational cryptographic protocols, gives fairness of cryptographic protocols from the views of game equilibrium, and analyzes the security and fairness models in cryptography based on equilibrium theory. Furthermore, some known results about the rational fair exchange, rational secret sharing and rational multi-party computation are overviewed extensively. Then the definition of mechanism design in microeconomic is stated and its application prospect in rational cryptography is discussed. Finally, the designs of rational cryptographic protocols based on special game model, hybrid preference model and equilibrium theory in this field are introduced. In particular, the fair mechanism designs of rational cryptographic protocols are recommended. The challenges and opportunities of this promising topic are summarized at the end of this paper.

Debug and Analysis on Fully Homomorphic Cryptography Hot!
LU S Q, WANG S F, HAN X, CHENG Q F
Journal of Cryptologic Research. 2017, 4 (1): 16-28. ;  doi: 10.13868/j.cnki.jcr.000159
Full Text: HTML (1 KB)  PDF (2322 KB)  ( 178 )
Show Abstract ( 90 )

The studies on three FHE programs, HElib, FHE-CODE and FHE-master, which are based respectively on three different encryption algorithms, are conducted in this paper. Through debugging and parameter-modification, this paper analyzes noise, runtime and storage space, in order to verify the theoretical and practical properties of related algorithms. They can achieve high precision encryption by increasing security parameter. The longer security parameter, the longer the length of the cipher text, but the storage space occupied will be larger. As a result, increasing the length of the cipher text or encrypted cipher text can improve the security level of the algorithm. Meanwhile, reducing the modulus or reducing security parameters can reduce the noise and increase the efficiency. In addition, we analyze corresponding three kinds of algorithms: Gentry’s algorithm, DGHV and BGV. We compare the three schemes from the aspects of security, efficiency, program implementation and their relations. It is concluded that HElib is more complex and secure, and the running time is longer. The logic of FHE-CODE is relatively clear, and it is more efficient. FHE-master achieves the retrieval of the cipher text by file read operation. By means of comparison, this paper is intended to provide advice for the studies of the FHE-encryption algorithms.

An Algorithm of Large Capacity Webpage Information Hiding Based on the Class Attribute Hot!
DU Y G, XUE F
Journal of Cryptologic Research. 2017, 4 (1): 29-37. ;  doi: 10.13868/j.cnki.jcr.000160
Full Text: HTML (1 KB)  PDF (781 KB)  ( 80 )
Show Abstract ( 42 )

In today’s rapid development of information technology, information hiding has become the focus in information security field. Since each Web site as well as network communication depends on digital works, such as audio, image, webpage, etc. And information hiding technology embeds the secret information into the digital works and does not damage the original carrier. Without the special detection tools, a third party is unaware of the existence of the secret information. Accordingly, digital signatures and private information can be transmitted over the Internet securely. Because of the small information redundancy of web documents, not much research results can be found. But the web application is very popular in information transmission; it has great significance to study web information hiding algorithms. Note that the existing algorithms of webpage information hiding have a common shortcoming that did not consider the capacity, robustness and invisibility completely. Based on the above, this paper proposes a webpage information hiding algorithm based on the class attribute and the process of webpage making. The algorithm is based on two basic ideas: the first idea is to hide information into the class attribute of the element, the second one is that the hidden information is regarded as a link between the structural layer, the presentation layer and the behavior layer, which is an organic part of the webpage rather than the redundancy of the webpage. Experimental results show that the algorithm greatly improves the webpage information hiding capacity, has strong robustness and invisibility, and the method for extraction is simple.

A Transformed BF-IBE Scheme with Adaptive Security in the Standard Model Hot!
WANG X Q, XUE R
Journal of Cryptologic Research. 2017, 4 (1): 38-48. ;  doi: 10.13868/j.cnki.jcr.000161
Full Text: HTML (1 KB)  PDF (521 KB)  ( 170 )
Show Abstract ( 75 )

In 1984, Shamir first proposed the notion of identity-based encryption without giving a concrete construction. In 2001, the first IBE scheme was constructed by Boneh and Franklin, who also formally defined IND-aID-CPA security for IBE constructions. However, the security proof of their scheme was in the random oracle model. After the BF-IBE scheme, Boneh, Boyen and Waters constructed two typical IBE schemes with adaptive security based on number theory in the standard model in 2004 and 2005, respectively. However, in the former IBE scheme, the sizes of the decryption key and the ciphertext are both quite large, while the security proof of the latter IBE scheme is very complicated. In contrast to the above two schemes, the BF-IBE scheme has smaller size of secret key and ciphertext, it has practical significance as how to initiate RO in the BF-IBE scheme. The main contribution of this paper is to transform the original BF-IBE scheme in the random oracle model into one in the standard model, while maintaining smaller size of secret key and ciphertext and with more compact security proof. Specifically, we study and employ the method proposed by Hohenberger, Sahai and Waters in 2014, that initiates the random oracle with a concrete hash function in full domain hash applications, to transform the BF-IBE scheme with adaptive security in the random oracle model to that with the same security in the standard model.

On Linear Properties of G Function in NORX Hot!
CHENG W, GUAN J
Journal of Cryptologic Research. 2017, 4 (1): 49-57. ;  doi: 10.13868/j.cnki.jcr.000162
Full Text: HTML (1 KB)  PDF (625 KB)  ( 102 )
Show Abstract ( 35 )

NORX is an authenticated encryption scheme introduced by Jean-Philippe Aumasson in 2014 as a candidate of the CAESAR competition. It is based on sponge structure which supports an arbitrary parallelism degree. The only operations used in the core permutation of NORX are AND, rotation, XOR and shift, called LRX construction, which improves hardware efficiency and simplifies cryptanalysis. To study the cryptographic properties of the core permutation is essential for its security evaluation. NORX consists of two variants denoted as NORX32 and NORX64, which provide128-bit security and 256-bit security respectively. There have been a few analysis results such as differential, higher differential and guess and determine cryptanalysis but no linear cryptanalysis has been found so far. In this paper, we start from the linear properties of basic function H, use probabilistic bits to analyze the simplified version of function H and get its bitwise probability distribution. Then we propose a fast computing algorithm to compute the correlation coefficient of H function. Depending on the algorithm, we derive the structure of correlation coefficient of H function. Furthermore, we analyze the function component of H in NORX, then derive a necessary and sufficient condition on input and output masks when linear approximation has nonzero-correlation. Based on the property that single input mask determines single output mask when the correlation coefficient is nonzero, we derive some nonzero-correlation properties on the core permutation function G. These analysis results can be a basis for further linear and zero-correlation linear cryptanalysis of NORX.

Security Evaluation for Fault Attacks on Lightweight Block Cipher Midori Hot!
WANG Y D, ZHAO X J, ZHANG F, GUO S Z, WU L F, LI W, LOU X X
Journal of Cryptologic Research. 2017, 4 (1): 58-78. ;  doi: 10.13868/j.cnki.jcr.000163
Full Text: HTML (1 KB)  PDF (602 KB)  ( 86 )
Show Abstract ( 65 )

Midori is a lightweight block cipher of 128-bit key size proposed at ASIACRYPT 2015. It is a family of two block ciphers: Midori64 and Midori128 with 64-bit and 128-bit block size respectively, they can be used to protect small computing devices in IoT. The resistance of Midori64 and Midori128 against fault attacks is evaluated. Firstly, the remained key entropy of Midori is evaluated by analyzing the fault propagation path based on information theory. Theoretical analysis results show that: based on half byte and full byte fault model in round R–3, one fault injection can reduce the key entropy of Midori64 and Midori128 to 68.47 and 8.03 bits, respectively. However, the computation complexity in analyzing faults in round R–2 to round R–3 is unaffordable and multiple fault injections can solve this problem. Then, the remained key entropy of Midori is verified by differential fault analysis (DFA) technique. The result demonstrates that: three random half byte fault injections can reduce the key entropy of Midori64 to 8.10 bits and two random byte fault injections can recover the full secret key of Midori128. Finally, an algebraic technique is introduced into fault attack on Midori and an algebraic fault analysis (AFA) is applied to optimize the DFA result. The results show that: AFA can extend fault attack on Midori64 to more complicated fault models. Based on the byte fault model in round R–3 and half byte fault model in round R–4, four and ten fault injections can recover the full 128-bit key of Midori64, respectively. Based on the byte fault model in round R–3, single fault injection can reduce the key entropy of Midori128 to less than 16-bit for 94% of the cases. Thus, the last 5 rounds of Midori should be protected against fault attacks.

Linear Complexity of Binary Sequences Derived from Generalized Polynomial Quotients modulo a Prime-power Hot!
WAN Y Q, DU X N
Journal of Cryptologic Research. 2017, 4 (1): 79-84. ;  doi: 10.13868/j.cnki.jcr.000164
Full Text: HTML (1 KB)  PDF (498 KB)  ( 77 )
Show Abstract ( 40 )

Pseudorandom sequences with good properties are widely used in simulation, ranging system, spread spectrum communication, especially in stream cipher systems. Since 2011, when A Ostafe, I E Shparlinski proposed the idea to use Fermat quotient to design cryptographic primitives, based on Fermat quotient and its extended functions, the construction and the property analysis of pseudorandom sequences has become a new research direction. This paper extends the polynomial quotient modulo an odd prime to its general case with modulo pr and r>=1. From the new quotient proposed, we define a class of pr+1-periodic binary threshold sequences and discuss their linear complexities with the restriction of 2 being a primitive root of modulo p2, and the parameter w can take an arbitrary value. The linear complexities are very close to their periods and are of desired value for cryptographic purpose. The constructed sequences are not simple extension of the existing ones, they have high linear complexity and can resist the attack of Berlekamp-Massey algorithm, which has potential application in the field of secure communication.

A Hyperchaotic Digital Voice Encryption Algorithm for Mobile Communication Hot!
LIU W H, SUN K H, ZHU C X
Journal of Cryptologic Research. 2017, 4 (1): 85-98. ;  doi: 10.13868/j.cnki.jcr.000165
Full Text: HTML (1 KB)  PDF (2812 KB)  ( 99 )
Show Abstract ( 64 )

With the development of mobile Internet and cloud computing, information security becomes an increasingly serious issue. To improve the security of voice transmission, a new hyperchaotic digital voice encryption algorithm for mobile communications is proposed. In this algorithm, the G.711A-law standard is used to compress the 16-bit voice into 8-bit binary sequences. Then a pseudo-random sequence generator is designed based on Folded-towel hyperchaotic map. This map is hyperchaotic with two positive Lyapunov exponents, so it can generate more complex key sequences. In the encryption process, to improve the resistance against differential attack, the nonlinear cross Xor operation is designed for binary sequences to improve the plaintext sensitivity. Each frame of the acquired voice is taken as a group. Combined with the ciphertext cross diffusion technique and the cross Xor operation, two rounds of alternative encryption operations are carried out, and the final ciphertext is transmitted to the next group to conduct the diffusion between groups. Afterwards, this algorithm is applied to the Android platform, and an IP security communication software is developed. The experimental results and performance analysis show that this algorithm has high security and encryption speed. Furthermore, it has a large key space and high key sensitivity, and can resist the statistical, differential and brute-force attacks. Therefore, it has good application prospect in real-time and secure transmission of voice

Journal of Cryptologic Research
Accepts
Note: The papers published below will continue to be available from this page until they are assigned to an issue. To see an article, click its [PDF] link. To review many abstracts, check the boxes to the left of the titles you want, and click the 'Selected articles' button. To see one abstract at a time, click its [Abstract] link.
Journal of Cryptologic Research
2016 Vol.3      No.1      No.2      No.3      No.4      No.5      No.6
2015 Vol.2      No.1      No.2      No.3      No.4      No.5      No.6
2014 Vol.1      No.1      No.2      No.3      No.4      No.5      No.6
密码学报
 Top Read
»

From Bilinear Pairings to Multilinear Maps

ZHANG F G
2016, 3(3): 228-228. Full Text: PDF (571KB) (1107)
»

Weakly Regular One-way Functions and Their Applications

YU Y, LI X X
2016, 3(2): 113-113. Full Text: PDF (504KB) (515)
»

More Efficient Fingerprint Biometric Encryption

GAO Y, ZHENG C C, ZHANG K, CHEN J
2016, 3(2): 170-170. Full Text: PDF (639KB) (791)
»

Secure and Efficient Data Retrieval Scheme Using Searchable Encryption in Cloud

XU L, XU C G, YU X L
2016, 3(4): 339-339. Full Text: PDF (666KB) (452)
»

A Program of Authentication and Key Protection for Hard Disk Encryption

GU S S, XIA L N, JIA S J
2016, 3(2): 136-136. Full Text: PDF (558KB) (493)
»

Structural Cryptanalysis

SUN B, LI C
2016, 3(4): 329-329. Full Text: PDF (530KB) (481)
»

Weighted Dynamic and Verifiable Multi-Secret Sharing Scheme

ZHANG M W, CHEN B W, XIE H T
2016, 3(3): 237-237. Full Text: PDF (433KB) (394)
»

A Privacy-preserving Outsourcing Set Union Protocol

SUN M H, GONG Z
2016, 3(2): 125-125. Full Text: PDF (687KB) (440)
»

Q_Value Test: A New Method on Randomness Statistical Test

ZHUANG J, MA Y, ZHU S Y, LIN J Q, JING J W
2016, 3(2): 201-201. Full Text: PDF (1193KB) (420)
»

Design and Analysis of Stream Ciphers: Past, Present and Future Directions

ZHANG B, XU C, FENG D G
2016, 3(6): 545-545. Full Text: PDF (1123KB) (501)
»

Construction of a Lattice Based Forward-Secure Signature Scheme

LI M X, AN N
2016, 3(3): 257-257. Full Text: PDF (421KB) (351)
»

New Construction of Lattice-based Programmable Hash Function

ZHANG J
2016, 3(5): 432-432. Full Text: PDF (579KB) (404)
»

DPA-based Adaptive Chosen-message Attack on CRT-RSA

LI Z J, SHI R H, WANG J X, LI C, LI H B, SHI X L
2016, 3(2): 210-210. Full Text: PDF (1032KB) (446)
»

Multi-Bit Differential Fault Analysis of Grain-v1

YE C D, TIAN T
2016, 3(3): 269-269. Full Text: PDF (367KB) (321)
»

An Improvement of the Key Schedule of PRIDE

DAI Y B, CHEN S Z
2016, 3(3): 291-291. Full Text: PDF (305KB) (330)
»

Research on Modularization of Fairness Rational Multi-party Computation

LI T, WANG Y L
2016, 3(4): 407-407. Full Text: PDF (484KB) (253)
»

Strongly Leakage-resilient and Unconditionally Secure Dynamic Secret-sharing Scheme

ZHANG M W, CHEN B W, LI F G,JIANG Y J, HARN Lein
2016, 3(4): 373-373. Full Text: PDF (664KB) (304)
»

Efficient Revocable Group Signature Scheme with Batch Verification in VANET

ZHAO Z, CHEN J, ZHANG Y Y, DANG L J
2016, 3(3): 306-306. Full Text: PDF (585KB) (277)
»

Two-round Deniable Group Key Agreement Protocol

CHEN Y, HE M X, ZENG S K, LI X
2016, 3(2): 146-146. Full Text: PDF (614KB) (331)
»

Identity-based Generalized Proxy Signcryption in the Standard Model

ZHOU C X
2016, 3(3): 320-320. Full Text: PDF (409KB) (327)
»

Certificateless Asymmetric Group Key Agreement

CHEN R X, CHEN J, ZHANG Y Y, DANG L J
2016, 3(4): 398-398. Full Text: PDF (755KB) (331)
»

Unprovable Security of CCTR Authentication Mode

LI Y L, WANG P
2016, 3(4): 381-381. Full Text: PDF (384KB) (233)
»

Privately Determining Protocol on Three Points Are Collinear and Its Applications

ZUO X J, YANG X L, LI S D
2016, 3(3): 248-248. Full Text: PDF (489KB) (264)
»

An Improved Algorithm of Information Set Decoding

LI M D, CAI K J, SHAO Y F
2016, 3(5): 515-515. Full Text: PDF (537KB) (174)
»

Estimating Concert Security Parameters of Fully Homomorphic Encryption

CHEN Z G, SHI Y F, SONG X X
2016, 3(5): 491-491. Full Text: PDF (575KB) (329)
»

Chosen Plaintext Attacks on CRT-RSA

LI Z J, PENG Q, SHI R H, LI C, MA Z P, LI H B
2016, 3(5): 461-461. Full Text: PDF (5078KB) (323)
»

Research on Combined Public Key Cryptographic Scheme for Smart Grid

HAN Y N, LI F G
2016, 3(4): 351-351. Full Text: PDF (1174KB) (287)
Journal of Cryptologic Research
 Top Download
»

Research on Attribute-based Cryptography

Feng D G, Chen C
2014, 1(1): 12-12. Full Text: PDF (769KB) (4815)
»

Survey of Lattice-based Cryptography

Wang X Y, Liu M J
2014, 1(1): 27-27. Full Text: PDF (678KB) (4316)
»

An Overview on the Security Techniques and Challenges of the Internet of Things

Wu C K
2015, 2(1): 53-53. Full Text: PDF (401KB) (3170)
»

Research on White-box Cryptography

Lin T T, Lai X J
2015, 2(3): 267-267. Full Text: PDF (333KB) (2802)
»

Secret Key Extraction in Wireless Channel

Li G Y, Hu A Q, Shi L
2014, 1(3): 224-224. Full Text: PDF (1519KB) (2732)
»

Cryptanalysis of Quantum Cryptographic Protocols

Wen Q Y, Qin S J, Gao F
2014, 1(2): 210-210. Full Text: PDF (866KB) (2398)
»

Provable Security for Public Key Encryption——Challenges and Approaches

Liu S L
2014, 1(6): 550-550. Full Text: PDF (447KB) (2250)
»

Power Analysis on Lightweight Mask Scheme

Tang M, Wang X, Li Y B, Xiang X, Qiu Z L, Zhang H G
2014, 1(1): 63-63. Full Text: PDF (1621KB) (2106)
»

Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table

Zheng Z X, Ji Q B, Yu H B
2014, 1(1): 110-110. Full Text: PDF (778KB) (2068)
»

A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm

Shang M, Ma Y, Lin J Q, Jing J W
2014, 1(2): 166-166. Full Text: PDF (1051KB) (1915)
Top Cited

Top CitedTop CitedTop CitedTop CitedTop Cited
  Email Alert
Supervised&Sponsored
Supervised by China Association for Science and Technology(CAST)
Sponsored by Chinese Association for Cryptologic Research(CACR),Beijing Academy of Information Science & Technology(BAIST) and China Science and Technology Press
Announcement
more>>     
Links
   » CACR
   » mathmagic
   » Journal of Software
Copyright © Journal of Cryptologic Research