期刊文献+

恶意模型下公平的安全两方计算协议 被引量:1

Fair and Secure Two-Party Computation Protocol in the Malicious Model
下载PDF
导出
摘要 安全多方计算通过参与者自行进行信息交互和计算完成,信息交换和计算对协议的公平性有很大影响。在恶意模型下基于m/2-out-of-m方法和知识承诺方案,提出一种两方公平交换协议,并用该协议构造一个满足公平性的安全两方计算协议。 Secure multi-party computation is achieved through exchanging information and computation, so exchange and computation has great impact on fairness. This paper proposed a fair two-party exchange protocol based on m/2 - out - of- m technical and the knowledge commitment in malicious model, and then constructed a secure two-party computation protocol with fairness.
作者 徐滨 彭长根
机构地区 贵州大学理学院
出处 《贵州大学学报(自然科学版)》 2012年第1期75-78,87,共5页 Journal of Guizhou University:Natural Sciences
基金 国家自然科学基金项目(60963023) 贵州省自然科学基金项目([2009]2113) 贵州大学博士基金项目(2007-040) 贵州大学研究生创新基金项目(校研理工2011006)
关键词 恶意模型 安全两方计算 公平性 知识承诺 malicious model secure two-party computation fairness knowledge commitment
  • 相关文献

参考文献10

  • 1M.Blum.How to exchange(secret)keys[J].15th Annual ACMSymposium on Theory of Computing(STOC),1983,1(2):175-193.
  • 2A.Yao.How to generate and exchange secrets[C].27th IEEESymposium on Foundations of Computer Science.Toronto:IEEEComputer Society,1986:162-168.
  • 3R Cleve.Limits on the security of coin flips when half the proces-sors are faulty[J].18th Annual ACM Symposium on Theory ofComputing(STOC).New York:ACM Press,1986:364-369.
  • 4S.Gordon,C.Hazay,J.Katz.Complete Fairness in Secure Two-Party Computation[J].40th Annual ACM Symposium on Theoryof Computing(STOC).New York:ACM Press,2008:413-422.
  • 5S.Gordon,J.Katz.Partial fairness in secure two-party computa-tion[J].Computer Science,Springer-Verlag,2010,6110:157-176.
  • 6M.Kiraz.Secure and Fair Two-Party Computation[D].Eind-hoven:Technische Universiteit Eindhoven,2008:1-117.ht-tp://alexandria.tue.nl/extra2/200811317.pdf.
  • 7B.Pinkas.Fair secure two-party computation[J].Computer Sci-ence,Springer-Verlag,2003,2656:87-105.
  • 8D.Boneh,M.Naor.Timed Commitments[J].Computer Science,Springer-Verlag,2000,1880:236-254.
  • 9Y.Lindell,B.Pinkas.An efficient protocol for secure two-partycomputation in the presence of malicious adversaries[J].Comput-er Science,Springer-Verlag,2007,4515:52-78.
  • 10A.Yao.Protocols for Secure Computation[C].23rd IEEE Sym-posium on Foundations of Computer Science.Chicago:IEEE Com-puter Society,1982:160-164.

同被引文献11

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报,2007,30(2):248-254. 被引量:30
  • 3王萼芳,石生明.高等代数[M].北京:高等教育出版社,2003.
  • 4YAO A C. Protocols for secure computations [ C ]//Pree of the 23rd Annual Symposium on Foundations of Computer Science. Washington DC : IEEE Computer Society, 1982 : 160-164.
  • 5GOLDREICH O, MICALI S, WIGDERSON A. How to play any mental game[ C]//Proc of the 19th Annual ACM Conference on Theory of Computing. New York: ACM Press, 1987:218- 229.
  • 6ATALLAH M J, DU Wen-liang. Secure multi-party computational ge- ometry[ C]//Proc of the 7th International Workshop on Algorithms and Data Structures. Berlin : Springer-Verlag,2001 : 165-179.
  • 7DU Wen-liang, ATALLAH M J. Secure multi-party computation prob- lems and their applications:a review and open problems[ C ]//Proc of Workshop on New Security Paradigms. New York:ACM Press, 2001: 11-20.
  • 8杨锦钜.用一般方程表示的空间两平行直线间的距离公式[J].佛山大学佛山师专学报:理工版,1990,8(4):81-87.
  • 9BRASSARD G, CREPEAU C, ROBERT J M, All-or-nothing disclo- sure of secrets[ C]//Proc of CRYPTO on Advances in Cryptology. Berlin : Springer'Verlag, 1986:234-238.
  • 10程文娟,董莹莹,汪庆,朱俊红.有关保护私有信息的三角不等式判定问题研究[J].合肥工业大学学报(自然科学版),2012,35(5):625-628. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部