期刊文献+

对不经意传输协议的分析 被引量:2

Analysis of oblivious transfer
下载PDF
导出
摘要 通过对Y.Mu等提出的3组从n条消息中获取m条不经意传输协议的分析,指出了协议的不安全因素,并分别做了改进,防止了用户得到更多的消息或不遵循协议,其中对"Betterm-nOT"的改进方案比Y.Mu等提出的所有方案效率都高. We analyze the security of the three m out of n oblivious transfer schemes proposed by Y. Mu et al, and then point out the insecurities of their schemes. We also provide our improvements on them respectively, which prevent users from getting more messages or disobeying the protocol. One of the improved schemes is more efficient than all the schemes proposed by Y. Mu et al.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第1期130-132,138,共4页 Journal of Xidian University
基金 国家973计划资助项目(G1999035803)
关键词 不经意传输 安全性分析 改进协议 Public key cryptography Security of data
  • 相关文献

参考文献1

二级参考文献3

共引文献7

同被引文献20

  • 1赵春明,葛建华,李新国.基于RSA数字签名的增强不经意传输协议[J].西安电子科技大学学报,2005,32(4):562-565. 被引量:4
  • 2仲红.安全多方计算的关键技术分析[J].安徽农业大学学报,2007,34(2):291-295. 被引量:2
  • 3江铭辉,古熙悠.Engineering the Divide-and-Conquer Closest Pair Algorithm[J].Journal of Computer Science & Technology,2007,22(4):532-540. 被引量:2
  • 4Yao A C. Protocols for secure computations[ C]// In proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago, USA: [ s. n. ], 1982:160 - 164. 被引量:1
  • 5Atallah M J, Du Wenliang. Secure Multi - party Computational Geometry[J]. Lecture Notes In Computer Science, 2001,2125 : 165 - 179. 被引量:1
  • 6Du Wenliang, Atallah M J. Secure Multi- Party Computation Problems and Their Applications: A Review and Open Problems[C]//In Proceedings of New Security Paradigms Wordshop. Cloudcroft, New Mexioo: [ s. n. ], 2001 : 11 - 20. 被引量:1
  • 7Clarkson K L, Yao A C. Algorithms for closest-- point problems(computational geometry)[D]. Stanford, USA:Stanford University Press, 1985. 被引量:1
  • 8Su Peter. Algorithms for Closest Point Problems:Practice and Theory[ R]. Nathan Smith Building Hanover, USA: Dartmouth College Press, 1992. 被引量:1
  • 9Wang Chih- fang, Sahni S. Computational Geometry on The OTIS- Mesh Optoelectronie Computer [ C]//ICPP. [ s. l. ] : IEEE Computer Society, 2002: 501 - 510. 被引量:1
  • 10Du Wenliang, Zhan Zhijun. A practical approach to solve secure multi- party computation problems[ C]//In New Security Paradigms Workshop. Virginia Besch, Virghla, USA: [ s. n. ] ,2002 : 127 - 135. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部