期刊文献+

对称相关免疫函数的构造 被引量:3

Constructions of Symmetric Correlation Immune Functions
下载PDF
导出
摘要 n元一阶对称相关免疫函数的构造等价于某个线性方程在二元域上的求解.通过求解该线性方程的等价方程,在5种情形下求出了该线性方程的部分解,由此在5种情形下构造出了部分n元一阶对称相关免疫函数.其中4种情形的构造是新提出的. The construction of symmetric correlation immune functions with n variables is equivalent to the solution in the binary field for a certain linear equation. When solving the equivalent equation of this linear equation, a part of solutions for this linear equation will be found out in five cases. Numbers of symmetric correlation immune functions with n variables are constructed in these cases. Four of the five constructions are found firstly.
作者 莫骄 温巧燕
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第3期59-62,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家"863计划"项目(2006AA01Z419) 国家自然科学基金重大研究计划项目(90604023) 北京市自然科学基金项目(4072020)
关键词 对称函数 相关免疫函数 线性方程 symmetric functions correlation immune functions linear equation
  • 相关文献

参考文献6

二级参考文献30

  • 1ZHANGJie,CHANGZu-ling,WENQiao-yan.Further Results of Cheating Immune Secret Sharing[J].The Journal of China Universities of Posts and Telecommunications,2004,11(4):26-28. 被引量:3
  • 2莫骄,温巧燕.平衡对称布尔函数的构造与计数[J].北京邮电大学学报,2006,29(5):15-18. 被引量:6
  • 3[1]BIHAM E, SHAMIR A. Differential cryptanalysis of DESlike cryptosystems[J]. Journal of Cryptology, 1991,4(3) :3-72.
  • 4[2]SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) :612 - 613.
  • 5[3]FELDMAN P. A practical scheme for non-interactive verifiable secret sharing[A]. Proceedings of the 28th IEEE Symposium on Foundations of Computer Science[ C]. Los Alamitos(CA): IEEE Computer Society Press, 1987. 427 - 437.
  • 6[4]PEDERSEN T. P. Non-interactive and information-theoretic secure verifiable secret sharing[A]. Advances in Cryptology, CRYPTO'91[C]. Bedin(Bermany): Springer-Verlag, 1991. 576.
  • 7[5]SCHOENMAKERS B. A simple publicly verifiable secret sharing scheme and its application to electronic voting[A].Advance in Cryptology, CRYPTO'99 [ C ]. Berlin ( Germany): Springer-Verlag, 1999. 148 - 164.
  • 8[6]FEHR S, MAURER U. Linear VSS and distributed commitments based on secret sharing and pairwise Checks[A].Advance in Cryptology, CRYPTO' 2002 [ C]. Berlin (Germany): Springer-Verlag, 2002. 565 - 580.
  • 9[7]KOGA H. A general formula of the ( t, n )-threshold visual secret sharing scheme [ A]. ASIACRYPT 2002 [ C ]. Berlin (Germany): Springer-Verlag, 2002. 328 - 345.
  • 10[8]PIEPRZYK J, OKAMOTO E. Verifiable secret sharing and time capsules [ A ]. Proceedings of ICISC [ C ]. Seoul( Korea): 1999. 169- 183.

共引文献11

同被引文献20

  • 1杨义先.相关免疫布尔函数的计数[J].电子科学学刊,1993,15(2):140-146. 被引量:19
  • 2冯登国,肖国镇.对偶距离和相关免疫阶[J].通信学报,1994,15(1):15-16. 被引量:10
  • 3冯登国,肖国镇.一类相关免疫函数的非线性性和扩散特性[J].通信学报,1996,17(2):70-74. 被引量:4
  • 4莫骄,温巧燕.对称相关免疫函数的构造与计数[J].北京邮电大学学报,2007,30(1):49-52. 被引量:3
  • 5Siegenthaler T.Correlation immunity of nonlinear combining function for cryptographic applicafions[J].IEEE Trans on IT, 1984, IT-30 (5) :776-780.
  • 6Camion P, Carlet C, Charpin P, et al.On correlation immune funetions[C]//Advances in Cryptology-Crypto91.Berlin:Springer- Verleg, 1992 : 86-100.
  • 7Wu C K,Dawson E.Correlation immunity and resiliency of symmetric Boolean ftmctions[J].Theoretical Compute Science, 2004 (312) :321-335.
  • 8Seigenthaler T.Correiation-immunity of nonlinear combining func-tions for cryptographic applications.[J].IEEE Trans on IT, 1984, 30(5) :776-780.
  • 9Xiao Guozhen,Massey J L.A spectral characterization of correla- tion-immune combining functions[J].IEEE Trans on IT, 1988,34 (3) :569-571.
  • 10Stinson D R.The combinatorices of authentication and secrecy codes[J].Cryptology, 1990,2 ( 1 ) : 23-49.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部