基于模块化方法设计具有高级功能的密码系统的方法学

Q4 Social Sciences
Goichiro Hanaoka, Satsuya Ohata, Takahiro Matsuda, K. Nuida, Nuttapong Attrapadung
{"title":"基于模块化方法设计具有高级功能的密码系统的方法学","authors":"Goichiro Hanaoka, Satsuya Ohata, Takahiro Matsuda, K. Nuida, Nuttapong Attrapadung","doi":"10.5571/SYNTHENG.7.92","DOIUrl":null,"url":null,"abstract":"−92− Synthesiology English edition Vol.7 No.2 pp.92-104 (Sep. 2014) on average 34 pages long of which on average 24 pages were devoted to security definitions and security proofs. The contents are lists of difficult-to-understand mathematical formulas, and it is not easy to understand the correlation between these formulas and actual security. This is thought to be the major barrier in introducing highly functional cryptographic schemes to the real world. Particularly, even specialized researchers find it difficult to be convinced of the security, and a general user cannot be expected to use these schemes with full confidence. In fact, error in proof is often discovered later, even with cryptographic schemes that the designers have claimed that their security has been mathematically proven. Hereinafter, this problem will be called the security verification problem in cryptographic schemes.","PeriodicalId":39206,"journal":{"name":"Synthesiology","volume":"172 1","pages":"92-104"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Methodology for designing cryptographic systems with advanced functionality based on a modular approach\",\"authors\":\"Goichiro Hanaoka, Satsuya Ohata, Takahiro Matsuda, K. Nuida, Nuttapong Attrapadung\",\"doi\":\"10.5571/SYNTHENG.7.92\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"−92− Synthesiology English edition Vol.7 No.2 pp.92-104 (Sep. 2014) on average 34 pages long of which on average 24 pages were devoted to security definitions and security proofs. The contents are lists of difficult-to-understand mathematical formulas, and it is not easy to understand the correlation between these formulas and actual security. This is thought to be the major barrier in introducing highly functional cryptographic schemes to the real world. Particularly, even specialized researchers find it difficult to be convinced of the security, and a general user cannot be expected to use these schemes with full confidence. In fact, error in proof is often discovered later, even with cryptographic schemes that the designers have claimed that their security has been mathematically proven. Hereinafter, this problem will be called the security verification problem in cryptographic schemes.\",\"PeriodicalId\":39206,\"journal\":{\"name\":\"Synthesiology\",\"volume\":\"172 1\",\"pages\":\"92-104\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Synthesiology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5571/SYNTHENG.7.92\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Synthesiology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5571/SYNTHENG.7.92","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 4

摘要

−92−synthesis edition英文版Vol.7 no . pp.92-104(2014年9月),平均34页,其中平均24页为安全定义和安全证明。内容是一些难以理解的数学公式列表,要理解这些公式与实际安全性之间的相关性并不容易。这被认为是将高功能加密方案引入现实世界的主要障碍。特别是,即使是专业的研究人员也很难确信其安全性,并且不能期望普通用户完全放心地使用这些方案。事实上,证明中的错误往往是后来才发现的,即使是设计人员声称其安全性已经得到数学证明的加密方案。以下将此问题称为密码方案中的安全验证问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Methodology for designing cryptographic systems with advanced functionality based on a modular approach
−92− Synthesiology English edition Vol.7 No.2 pp.92-104 (Sep. 2014) on average 34 pages long of which on average 24 pages were devoted to security definitions and security proofs. The contents are lists of difficult-to-understand mathematical formulas, and it is not easy to understand the correlation between these formulas and actual security. This is thought to be the major barrier in introducing highly functional cryptographic schemes to the real world. Particularly, even specialized researchers find it difficult to be convinced of the security, and a general user cannot be expected to use these schemes with full confidence. In fact, error in proof is often discovered later, even with cryptographic schemes that the designers have claimed that their security has been mathematically proven. Hereinafter, this problem will be called the security verification problem in cryptographic schemes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Synthesiology
Synthesiology Social Sciences-Social Sciences (all)
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信