期刊文献+

基于安全双方计算的密钥改进方案

A Key Agreement of the Improvements Based on Secure two-Party Computation
下载PDF
导出
摘要 安全多方计算在密码学中拥有相当重要的地位,是近几年国际密码界研究的热点问题.文中主要是对安全双方计算的密钥协商方案中的方案进行了改进,提出了3种改进方案,即使窃听者获得与接收方完全一样的数据,此3种方案都是安全的. Secure Multiparty Computation protocol is an important area in cryptography.The research of multi-party computation was a subject of great importance in the international cryptographic circle.A key agreement scheme based on secure two-party computation is improved.Three schemes are proposed.It can be proved that even if Eve gets the same data as the receiver,the schemes are still secure.
作者 张珺铭
机构地区 贵州大学理学院
出处 《凯里学院学报》 2011年第3期126-128,共3页 Journal of Kaili University
关键词 隐私保护 密钥协商 多方安全计算 privacy protection secret-key agreement secure multi-party computation
  • 相关文献

参考文献5

  • 1YAO A. Protocols for secure computation[A]//Andrem C. Yao. Proc of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS)[C]. New York: IEEE Computer Security, 1982 : 160 - 164. 被引量:1
  • 2GOLDREICH O. Secure multi - party computation (working draft) [EB/OL]. (2000 - 10 - 01 ) [2011 - 03 -25]http://www. wisdom, weizamann, ac. it/- oded/ pp. htmt. 被引量:1
  • 3FISCHLIN M. A cost - effective pay-per- multiplication comparison method for millionaires[A]// Fischlin M. RSA Security 2001 Cryptographer's Track[C]. San Francisco: Lecture Notes in Computer Science, 2001: 457 - 471. 被引量:1
  • 4陈晓峰,伍前红,王育民.基于安全双方计算的密钥协商方案[J].西安电子科技大学学报,2003,30(4):477-480. 被引量:3
  • 5冯登国.密码学原理与实践[M].北京:电子工业出版社,2003. 被引量:5

二级参考文献10

  • 1Shannon C E. Communication Theory of Secrecy Systems[J]. Bell System Technical Journal, 1949, 28(4) : 656-715. 被引量:1
  • 2Massey J L. Contemporary Cryptography: an Introduction[A]. Contemporary Cryptology: the Science of Information Integrity[C]. New York: IEEE Press, 1991. 1-39. 被引量:1
  • 3Bennett C H, Brassard G, Ekert A K. Quantum Cryptography[J]. Scientic American, 192, 267(4): 50-57. 被引量:1
  • 4Bennett C H, Brassard G, Robert J M. Privacy Amplification by Public Discussion[J]. SIAN Journal on Computing, 1988, 17(2) :210-219. 被引量:1
  • 5Wyner A D. The Wire-tap Channel[J]. Bell System Technical Journal, 1975, 54(8) : 656-715. 被引量:1
  • 6Yao A. Protocols of for Secure Computation[ A ]. Proc 23rd IEEE Symposium on Foundations of Computer Science (FOCS'82) [ C ]. New York: IEEE Computer Security, 1982. 160-164. 被引量:1
  • 7Yao A. How to Generate and Exchange Secrets[A]. Proc 27th IEEE Symposium on Foundations of Computer Science (FOCS'86)[C].New York: IEEE Computer Security, 186. 162-167. 被引量:1
  • 8Fischlin M. A Cost-effective Pay-per-multiplication Comparison Method for Millionaires[DB/OL]. http://www. mi. informatik. unifrankfurt. de/research/papers. html, 2001-04-01. 被引量:1
  • 9Maurer. Information-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion[A]. EUROCRYPT'97 [C].Berlin: Springer-Veralg, 1997. 被引量:1
  • 10刘胜利,王育民.公开协商所提取的无条件安全秘密钥长度[J].西安电子科技大学学报,1999,26(4):436-439. 被引量:5

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部