期刊文献+

基于Paillier公钥密码体制的零知识证明方案 被引量:4

Zero Knowledge Proofs Protocol Based on Paillier Cryptosystem
下载PDF
导出
摘要 零知识证明方案在信息安全领域和电子商务中都有着很广泛的应用。而传统的零知识证明都是多轮的迭代,这使交互双方的通信量大幅增加,使得方案在实际应用中遇到了一定的困难。本文提出的方案在保证零知识证明方案正确性、完全性和零知识性的前提下,将运行的迭代攻数降低至1,最大限度地减少了交互双方的通信量。方案基于Paillier公钥密码体制,安全性等同于它。 The Zero-Knowledge Proof(ZKP)is a powerful tool which can be used and already be used for many cryptographic applications and E-Commerce.But all existing Zero-Knowledge Proofs are iterative in nature,it increases the communication traffic of in interactive bilateral,and makes difficult in practice.This thesis proposes a new ZKP protocol which runs in one-round while ensure the completeness property,and the soundness property,and decreases the communication traffic in the maximum extent.The scheme is based on the Paillier Cryptosystem,and ascribes security to it.
作者 袁春明
出处 《计算机与现代化》 2011年第4期45-46,49,共3页 Computer and Modernization
关键词 零知识证明 Carmiehael理论 Paillier公钥密码体制 单轮零知识方案 zero knowledge proofs Carmiehael theory Paillier cryptosystem one-round ZKP protocol
  • 相关文献

参考文献15

  • 1Goldwasser S, Micali S, Rackoff C. The knowledge complex- ity of interactive proof systems [ C ]//Proceedings of the 17th Annual ACM Symposium on Theory of Computing. Philadelphia, PA, USA:Society for Industrial and Applied Mathematices, 1985:291-304.
  • 2Goldreich O, Micali S, Wigderson A. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems [ J ]. J. ACM, 1991,38 (3) :691-729.
  • 3Feige U, Fiat A, Shamir A. Zero knowledge proofs of identity [ J ]. Journal of Cryptology, 1988,1 ( 2 ) : 77-94.
  • 4Koblitz Neal. A Course in Number Theory and Cryptography [ M ]. Springer, 1994.
  • 5Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [ J ]. Communications of the ACM, 1978,21 (2) : 120-126.
  • 6Oded Goldreich. Foundations of Corptogmphy: Volume 1, Basic Tools ( Voll ) [ M ]. Cambridge Unirersity Press,2001.
  • 7Bruce Schneier. Applied Cryptography( 2nd Edition ) [ M ]. Wiley, 1995.
  • 8Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[M ]. CRC Press, 1997.
  • 9Almuhamrnadi S, Sui N T, McLeod D. Better privacy and security in E-commerce: Using elliptic curve based zero knowledge proofs [ C ]//2004 IEEE International Conference on E-Commerce Technology ( CEC' 04 ). Washington, USA : IEEE Computer Society,2004:299-302.
  • 10Diffie W, Hellman M. New directions in cryptography [ J ]. IEEE Transaction on Information Theory, 1995,22 (6) : 644- 654.

同被引文献18

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部