期刊文献+

辫群上的不经意传输协议 被引量:2

Oblivious transfer protocols over braid groups
下载PDF
导出
摘要 量子计算的快速发展给基于整数分解或离散对数问题的密码协议带来严重威胁。为了研究抵抗量子分析的密码协议,基于非交换的辫群提出了一个2取1不经意传输协议,并将其扩展为N取1不经意传输协议。在共轭搜索问题和多重共轭搜索问题难解的前提下协议能同时保证发送方和接收方的隐私性。 The rapid development of quantum computing brings great challenge to cryptographic protocols based on the integer factorization or the discrete logarithm problem. In order to research quantum cryptanalysis-resistant cryptographic protocols, this paper proposed a 1-out-of-2 oblivious transfer protocol based on non-commutative braid group,which was extended to a 1-out-of-N oblivious transfer protocol. The protocols could provide privacy for both the sender and the receiver on base of the difficulty of the conjugacy search problem and the multiple conjugacy search problem.
出处 《计算机应用研究》 CSCD 北大核心 2010年第8期3042-3044,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10501053)
关键词 辫群 不经意传输 共轭搜索 多重共轭搜索 braid group oblivious transfer conjugacy search multiple conjugacy search
  • 相关文献

参考文献2

二级参考文献27

  • 1Shor PW.Polynomial-Time algorithms for prime factorization and discrete logarithms on a quantum computer.SIAM Journal on Computing,1997,26(5):1484-1509.
  • 2Cha JC,Cheon JH,Han JW,Ko KH,Lee SJ.An efficient implementation of braid groups.In:Boyd C,ed.Advances in Cryptology-Asiacrypt 2001.LNCS 2048,Berlin:Springer-Verlag,2001.144-156.
  • 3Ko KH,Lee SJ,Cheon JH,Han JW,Kang SJ,Park CS.New public-key cryptosystem using braid groups.In:Bellare M,ed.Advances in Cryptology-CRYPTO 2000.LNCS 1880,Berlin:Springer-Verlag,2000.166-183.
  • 4Lee E,Park JH.Cryptanalysis of the public key encryption based on braid groups.In:Biham E,ed.Advances in Cryptology-EuroCrypt 2003.LNCS 2656,Berlin:Springer-Verlag,2003.477-490.
  • 5Hughes J.A linear algebraic attack on the AAFG1 braid group cryptosystem.In:Batten L,Seberry J,eds.Information Security and Privacy-7th Australian Conf.,ACISP 2002.LNCS 2384,Berlin:Springer-Verlag,2002.176-189.
  • 6Cheon JH,Jun B.A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem.In:Boneh D,ed.Advances in Cryptology-CRYPTO 2003.LNCS 2729,New York:Springer-Verlag,2003.212-225.
  • 7Hofheinz D,Steinwandt R.A practical attack on some braid group based cryptographic primitives.In:Desmedt YG,ed.Public Key Cryptography-PKC 2003.LNCS 2567,Berlin:Springer-Verlag,2003.187-198.
  • 8Dehornoy P.Braid-Based Cryptography.In:Group Theory,Statistics,and Cryptography,Contemporary Mathematics 360.New York:ACM Press,2004.5-33.
  • 9Garber D,Kaplan S,Teicher M,Tsaban B,Vishne U.Probabilistic solutions of equations in the braid group.Advances in Applied Mathematics,2005,35(3):323-334.
  • 10Lee SJ,Lee E.Potential weaknesses of the commutator key agreement protocol based on braid groups.In:Knudsen LR,ed.EUROCRYPT 2002.LNCS 2332,New York:Springer-Verlag,2002.14-28.

共引文献18

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部