Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization作者机构:College of Cryptography EngineeringEngineering University of People’s Armed PoliceXi’an 710086China Key Laboratory of Network and Information Security under the People’s Armed PoliceXi’an 710086China
出 版 物:《China Communications》 (中国通信(英文版))
年 卷 期:2021年第18卷第8期
页 面:35-46页
核心收录:
学科分类:07[理学] 070104[理学-应用数学] 0701[理学-数学]
基 金:the National Natural Science Foundation of China(No.61572521,U1636114) National Key Project of Research and Development Plan(2017YFB0802000) Natural Science Foundation of Shaanxi Province(2021JM-252) Innovative Research Team Project of Engineering University of APF(KYTD201805) Fundamental Research Project of Engineering University of PAP(WJY201910)
主 题:generative model public key encryption indistinguishability model security model deep learning
摘 要:Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern ***,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC *** the trapdoor in a public key encryption mechanism turns out to be a type of limited *** this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search *** basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input *** architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two *** evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors.