期刊文献+

UC安全计算的一种信任模型 被引量:2

A Trust Model of UC Secure Computation
下载PDF
导出
摘要 UC(通用可组合)安全计算的存在性需要刻画某种基础假定的信任模型的支持。针对对于UC安全计算的信任模型研究甚少的现状,从使用信任模型的原因入手,分析比较了国外现有的信任模型,指出了各自的优势和存在的问题。在此基础上,提出了一种公钥基础设施风格的双陷门分离的信任模型DBT模型,作为实验在DBT模型中实现了UC安全的承诺协议。实验结果表明DBT模型集成了现有信任模型的优点,并且支持协议的完全可模拟性。 By the analysis of the reason of using a trust model in UC(Universally Composable) secure computation,overseas existing trust models were researched and their merits and demerits were indicated.Then based on Divided Bi-Trapdoor,a trust model named DBT that has the flavor of a "public-key infrastructure" was proposed,and as an experiment,a UC secure commitment protocol was implemented in this model.The DBT model has the complementary benefits of the existing models,and especially supports the full-simulation of protocols.
作者 张妤 胡杰
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2012年第3期106-111,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60703115) 国家"863"计划资助项目(2007AA01Z405)
关键词 密码协议 通用可组合 安全计算 承诺协议 信任模型 cryptographic protocol universally composable secure computation commitment protocol trust model
  • 相关文献

参考文献12

  • 1CANETFI R. Universally composable security:A new para- digm for cryptographic protocols [ C ]//42nd FOCS. 2001 : 136 - 145.
  • 2Green M, Hohenberger S. Universally composable adaptive oblivious transfer[ C ]. ASIACRYPT,2008:179 - 197.
  • 3Gorantla M C, Boyd C, Nieto J M G. Universally composable contributory group key exchange [ C ]. CCS, 2009 : 146 - 156.
  • 4郭渊博,王超,王良民.UC安全的空间网络双向认证与密钥协商协议[J].电子学报,2010,38(10):2358-2364. 被引量:12
  • 5贾洪勇,卿斯汉,谷利泽,杨义先.通用可组合的组密钥交换协议[J].电子与信息学报,2009,31(7):1571-1575. 被引量:8
  • 6Chaum D, Crepeau C, Damgard I. Multi-party unconditional- ly secure protocols [ C ]. 20th STOC, 1988 : 11 - 19.
  • 7Canetti R, Kushilevitz E, Lindell Y. On the limitations of u- niversally composable two-party computation without set-up assumptions [ C ]. EUROCRYPT,2003 : 68 - 86.
  • 8Canetti R, Lindell Y, Ostrovsky R, Sahai A. Universally composable two-party and multi-party computation[ C ]. 34th STOC ,2002 : 494 - 503.
  • 9Barak B, Canetti R, Nielsen J B, et al. Universally eompos- able protocols with relaxed set-up assumptions [ C ]. 45th FOCS ,2004 : 186 - 195.
  • 10Katz J. Universally composahle multi-party computation u- sing tamper-proof hardware [ C ]. EUROCRYPT, 2007 : 115 - 128.

二级参考文献11

  • 1CCSDS.CCSDS Operating Plan for Standards Development .http://public.ccsds.org/sites/cwe/cesg/Public/Operating 20 Plan 20-20latest 20version/ A01x2y4x1 20WorkingDec06.doc,2009-09-12.
  • 2CCSDS.CCSDS Security Working Group Meeting Notes .http://cwe.ccsds.org/sea/docs/SEA-SEC/ Meeting Materials/2004/Spring 202004 20Meeting (Montreal)/Spring 2004 Security WG Meeting Minutes.doc,2009-09-12.
  • 3R Canetti.Universally composable security:A new paradigm for cryptographic protocols .Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS 2001) .New York:IEEE Computer Society Press,2001.136-145.
  • 4R Canetti,H Krawczyk.Universally composable notions of key exchange and secure channels .Advances in Cryptology,Eurocrypt'02 .LNCS Vol.2332,Berlin:Springer-Verlag,2002.337-351.
  • 5R Canetti,M Fischlin.Universally composable commitments .Advances in Cryptology,Eurocrypt'01 .LNCS Vol.2139,Berlin:Springer-Verlag,2001.19-28.
  • 6I Damgard,Nielsen J.Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor .Advances in Cryptology,Eurocrypt'02 .LNCS Vol.2442,Berlin:Springer-Verlag,2002.581-596.
  • 7Canetti R,Halevi S,Katz J,et al.Universally composable password-based key exchange .Advances in Cryptology,Eurocrypt'05 .LNCS Vol.3494,Berlin:Springer-Verlag,2005.404-421.
  • 8Goldwasser S,Micali S.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,1998,17(2):281-308.
  • 9毛文波,著,王继林,伍前红,等,译.现代密码学理论与实践[M].2006,北京:电子工业出版社.
  • 10W Mao.Modern Cryptography:Theory and Practice[M].Beijing:Publishing House of Electronics Industry,2004.ag,2003.61-84.

共引文献15

同被引文献9

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部