期刊文献+

适用于数字对象的保密比较协议 被引量:2

A private comparing protocol for digital objects
下载PDF
导出
摘要 分析了现有保密比较协议无法使用于不确定数字对象比较的原因,用随机构造单向散列函数的方法设计了对不确定具体范围的数字对象进行比较的一种多方保密计算方案,协议能以零泄漏的方式快速比较两个数字对象是否相同.用广泛接受的模拟范例证明了方案的保密性. Analyzed the reason why existing private comparing protocols cannot be used to compare two non-deterministic digital objects, a secure multiparty computation protocol is designed by randomly constructing one-way hash function, which can be used to compare two non-deterministic digital objects. This scheme can be used to compare whether two digital objects are the same with zero information leaking. The well accepted simulation paradigm shows that the scheme is private.
作者 李顺东
出处 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第1期1-4,共4页 Journal of Shaanxi Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(60673065) 863高技术发展计划资助项目(2005AA114160)
关键词 密码学 多方保密计算 协议 零泄漏 cryptography secure multi-party computation protocol zero information leaking
  • 相关文献

参考文献2

二级参考文献27

  • 1SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 2Bruce Schneier著, 吴世忠等译.应用密码学.北京:机械工业出版社,2000(Bruce Schneier, Translated by Wu Shizhong et al. Applied Cryptography: Protocol, Algorithm, and Source Code in C(in Chinese), 2nd edition. Beijing: China Machine Press, 2000
  • 3U S Department of Commerce/National Institute of Standards and Technology. Digital Signature Standard. http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf, 2000
  • 4Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang. ElGamal-like digital signature and multi-signature schemes using self-certified public keys. The Journal of Systems and Software, 2000, 50(2): 99~105
  • 5Mohammad Peyravian, Allen Roginsky, Nev Zunic. Hash-based encryption system. Computer and Security, 1999, 18(4): 345~350
  • 6A Bosselaers, H Dobbertin, B Preneel. The new cryptographic Hash function RIPEMD-160. Dr Dobb's Journal, 1997, 22(1): 24~28
  • 7George Kollios, Vassilis J Tsotras. Hashing methods for temporal data. IEEE Trans on Knowledge and Data Engineering, 2002, 14(4): 902~919
  • 8Hwang Min-Shiang, Chang Chin-Chen, Hwang Kuo-Feng. A watermarking technique based on one-way Hash functions. IEEE Trans on Consumer Electronics, 1999, 45(2): 286~294
  • 9B Preneel. Analysis and design of cryptographic Hash functions[Ph D dissertation]. Katholieke University Leuven, Leuven, 1993
  • 10R C Merkle. A fast software one-way Hash function. Journal of Cryptology, 1990, 3(1): 43~58

共引文献3

同被引文献14

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部