Cut-and-Choose双向不经意传输
发布时间:2018-07-15 12:50
【摘要】:不经意传输作为现代密码学的一个基本工具,在安全协议的研究中起着重要作用.近年来,许多功能性更强的不经意传输变种被提出来,以适应不同的需求和环境.提出一个不经意传输变种,称为cut-and-choose双向不经意传输.基于同态加密给出该原语的一轮高效协议构造,且在半诚实模型下形式化证明了该协议的安全性.将cut-and-choose双向不经意传输运用到基于cut-and-choose技术的安全协议(尤其是安全两方计算)中,可以更具模块化地描述协议高层框架,降低协议交互轮数.此外,作为信息安全领域的一个底层基本工具,该原语本身也具有独立的研究意义.
[Abstract]:As a basic tool of modern cryptography, casual transmission plays an important role in the research of security protocols. In recent years, many more functional inadvertent transmission variants have been proposed to adapt to different needs and environments. Proposed a inadvertent transmission variant, called cut-and-choose bidirectional inadvertent transmission. Based on homomorphic encryption, a round of efficient protocol construction is presented, and the security of the protocol is formally proved under the semi-honest model. When cut-and-choose is applied to the security protocol based on cut-and-choose technology (especially the secure two-party computation), the protocol high-level framework can be described more modularly and the number of protocol interaction wheels can be reduced. In addition, as a basic tool in the field of information security, the primitive has its own independent significance.
【作者单位】: 山东大学计算机科学与技术学院;
【基金】:国家自然科学基金(61572294、61173139)~~
【分类号】:TP309
,
本文编号:2124127
[Abstract]:As a basic tool of modern cryptography, casual transmission plays an important role in the research of security protocols. In recent years, many more functional inadvertent transmission variants have been proposed to adapt to different needs and environments. Proposed a inadvertent transmission variant, called cut-and-choose bidirectional inadvertent transmission. Based on homomorphic encryption, a round of efficient protocol construction is presented, and the security of the protocol is formally proved under the semi-honest model. When cut-and-choose is applied to the security protocol based on cut-and-choose technology (especially the secure two-party computation), the protocol high-level framework can be described more modularly and the number of protocol interaction wheels can be reduced. In addition, as a basic tool in the field of information security, the primitive has its own independent significance.
【作者单位】: 山东大学计算机科学与技术学院;
【基金】:国家自然科学基金(61572294、61173139)~~
【分类号】:TP309
,
本文编号:2124127
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2124127.html