期刊文献+

椭圆曲线上高效可完全模拟的不经意传输协议 被引量:1

Efficient and fully simulated oblivious transfer protocol on elliptic curve
下载PDF
导出
摘要 不经意传输协议是安全多方计算的一个关键技术,是当前网络与信息安全研究的热点。基于双线性对及椭圆曲线上的困难问题,分别设计了半诚实模型下和标准恶意模型下的安全高效N选1不经意传输协议。,在半诚实模型下设计了一个椭圆曲线上的不经意传输协议,该协议只需2轮交互,接收方需要2次双线性对运算和1次椭圆曲线倍点运算,发送方需要n次椭圆曲线倍点运算和n次模幂运算,协议的安全可规约到椭圆曲线上的离散对数问题;构建了基于椭圆曲线上双线性对的零知识证明方案,并设计了一个恶意模型下的不经意传输协议,该协议只需3轮交互,接收者需要3次双线性对运算和3次椭圆曲线倍点运算,发送者需要n+1次椭圆曲线倍点运算和n+1次模幂运算,协议能在标准恶意模型下抵抗参与者的恶意攻击行为。实验结果得到在半诚实模型下协议平均运行时间需要0.7879 s,在标准恶意模型下协议平均运行时间需要1.2056 s,进一步论证协议的速度。 Oblivious transfer protocol,an important technology in secure multi-party computation,is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves,an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic,and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic,and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides,it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.7879 s and 1.2056 s respectively,which can further demonstrate the efficiency of the protocol.
作者 宋佳烁 李祯祯 丁海洋 李子臣 SONG Jiashuo;LI Zhenzhen;DING Haiyang;LI Zichen(Digital Rights Management Research Center,Beijing Institute of Graphic Communication,Beijing 102600,China)
出处 《网络与信息安全学报》 2023年第1期158-166,共9页 Chinese Journal of Network and Information Security
基金 国家自然科学基金(61370188) 北京市教委科研计划(KM202010015009,KM202110015004) 北京印刷学院博士启动金项目(27170120003/020) 北京印刷学院科研创新团队项目(Eb202101) 北京印刷学院校内学科建设项目(21090121021) 北京印刷学院重点教改项目(22150121033/009) 北京印刷学院科研基础研究一般项目(Ec202201)。
关键词 不经意传输 完全模拟 双线性对 零知识证明 安全多方计算 oblivious transfer fully simulation bilinear pairing zero-knowledge proof secure multi-party computation
  • 相关文献

参考文献5

二级参考文献22

  • 1郭渊博,张紫楠,杨奎武.基于PUFS的不经意传输协议[J].通信学报,2013,34(S1):38-43. 被引量:2
  • 2赵春明,葛建华,李新国.隐藏认证的不经意传输[J].电子与信息学报,2007,29(8):1984-1986. 被引量:3
  • 3Rabin M O.How to Exchange Secrets by Oblivious Transfer[R].Technical Report: TR-81, Aiken Computation Laboratory, Harvard University, 1981. 被引量:1
  • 4Camenisch J, Dubovitskaya M, Neven G.Oblivious Transfer with Hidden Access Control Policies[C]//Proc.of the 14th International Conference on Practice and Theory in Public Key Cryptography.Berlin, Germany: Springer-Verlag, 2011: 192-209. 被引量:1
  • 5Choi Seung-Geol, Hwang Kyung-Wook, Katz J, et al.Secure Multi-party Computation of Boolean Circuits with Applications to Privacy in On-line Marketplaces[C]//Proc.of the 12th Conference on Topics in Cryptology.Berlin, Germany: Springer-Verlag, 2012: 416-432.(下转第173页). 被引量:1
  • 6Even S, Goldreich O, Lempel A.A Randomized Protocol for Signing Contracts[J].Communications of the ACM, 1985, 28(6): 637-647. 被引量:1
  • 7Wolf S.Reducing String Oblivious Transfer to Universal Obli- vious Transfer[C]//Proc.of IEEE International Symposium on Information Theory.[S.l.]: IEEE Press, 2000. 被引量:1
  • 8Tzeng Wen-Guey.Effcient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters[J].IEEE Trans.on Computers, 2004, 53(2): 232-240. 被引量:1
  • 9Mu Yi, Zhang Junqi, Varadharajan V.m out of n Oblivious Transfer[C]//Proc.of the 7th Australian Conference on Information Security and Privacy.London, UK: Springer- Verlag, 2002: 395-405. 被引量:1
  • 10Chu Cheng-Kang, Tzeng Wen-Guey.Efficient k-out-of-n Obli- vious Transfer Schemes with Adaptive and Non-adaptive Queries[C]//Proc.of the 8th International Conference on Theory and Practice in Public Key Cryptography.Berlin, Germany: Springer-Verlag, 2005: 172-183. 被引量:1

共引文献12

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部