期刊文献+

保密多方量子排序问题的研究 被引量:2

Research of quantum secure multi-party ranking protocol
原文传递
导出
摘要 保密多方排序问题用于多方在不泄漏自己保密数值的前提下安全计算出自己保密数值在这n个数值中的排名情况,该问题是保密两方比较问题的扩展问题.本文设计了一个半诚实模型下的基于量子隐式模n+1加法保密多方量子排序协议,并且详细地分析了该协议对于多方的安全性. Secure multi-party ranking problem is used to rank n private integers without leaking further information. It is an extended problem of secure two-party comparing problem. A secure multi-party quantum ranking protocol in semi-honest model is presented based on the a quantum implicit module n + 1 addition. The security for multi-parties of the protocol is analyzed.
作者 刘文 王永滨
出处 《物理学报》 SCIE EI CAS CSCD 北大核心 2011年第7期46-53,共8页 Acta Physica Sinica
基金 2009年北京市文化创意产业发展专项资金项目 国家"211工程"项目 校级工科规划项目(批准号:XNG0925)资助的课题~~
关键词 保密多方计算 保密多方排序问题 量子隐式模n+1加法 secure multiJparty computation secure multi-party ranking problem quantum implicit module n + 1 addition
  • 相关文献

参考文献7

二级参考文献88

  • 1宋克慧.利用Λ型原子与双模腔场的相互作用进行量子信息处理[J].物理学报,2005,54(10):4730-4735. 被引量:12
  • 2杨宇光,温巧燕,朱甫臣.单个N维量子系统的量子秘密共享[J].物理学报,2006,55(7):3255-3258. 被引量:9
  • 3M Naor,B Pinkas.Efficient oblivious transfer protocols[A].Proc 12th Ann Symp Discrete Algorithms[C].New York:ACM Press,2001.448-457.
  • 4Wen-Guey Tzeng.Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J].IEEE TRANSACTIONS ON COMPUTERS,2004,53(2):232-240.
  • 5William Stallings.Cryptography and Network Security:Principles and Practice (2nd ed)[M].Beijing:Tsinghua University Press,2003.264-269.
  • 6A Yao.Protocols for secure computations[A].Proceeding of the 23th IEEE Symposium on Foundations of Computer Science[C].Los Alamitos,CA:IEEE Computer Society Press,1982.160-164.
  • 7C Cachin.Efficient private bidding and auction with an obvious third party[A].Proceeding of the 6th ACM conference on computer and communication security[C].New York:ACM Press,1999.120-127.
  • 8Oded Goldreich,Silvio Micali,Avi Wigderson.How to play ANY mental game[A].Proceedings of the nineteenth annual ACM conference on Theory of computing[C].New York:ACM Press,1987.218-229.
  • 9O Goldreich.Secure multi-party computation (working draft)[OL].http://www.wisdom.weizmann.ac.il/home/oded/public-html/foc.html,2002.
  • 10S Goldwasser.Multi-party computations:Past and present[A].Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing[C].New York:ACM Press,1997.21-24.

共引文献89

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部