期刊文献+

可证明安全k-out-of-n不经意传输方案的安全分析与改进 被引量:1

Cryptanalysis and improvement of provably secure k-out-of-n oblivious transfer scheme
下载PDF
导出
摘要 不经意传输是密码学研究的一个重要内容。对一种可证明安全的k-out-of-n不经意传输方案安全性进行了分析。该方案的构造方法很新颖,具有很高的计算效率和传输效率。但是分析发现其存在一个明显漏洞,可以使得接收者能够获得发送者发送的全部信息,从而违背了不经意传输的安全性要求。详细分析后,通过引入一个随机数对该方案进行了改进,改进后的方案消除了原方案存在的漏洞,并且传输开销和计算开销与原方案相同,方案安全性同样是建立在判断性Diffie-Hellman(DDH)问题为困难问题的假设之上。 Oblivious transfer plays an important role in the field of cryptography. A provably secure k-out-of-n oblivious transfer scheme was analyzed in this paper. This scheme was based on a novel method and was efficient in computation and communication. However, it was found not secure at all after deep analysis. The main fault is that the receiver can easily acquire all the secret messages sent by sender. Thus it does not satisfy the secure requirement of oblivious transfer. Finally, by adding a random number the fault of the scheme was fixed. The improved k-out-of-n oblivious transfer scheme keeps the same communicational overhead and computational overhead as the original one. The security of the improved scheme is also based on Decisional Diffie-Hellman (DDH) assumption.
出处 《计算机应用》 CSCD 北大核心 2014年第5期1296-1299,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272436 61272404)
关键词 不经意传输 可证明安全 密码分析 判断性Diffie-Hellman假设 安全计算 Oblivious Transfer (OT) provable secure cryptanalysis Decisional Diffie-Hellman (DDH) assumption secure computation
  • 相关文献

参考文献14

  • 1NAOR M,PINKAS B,SUMNER R.Privacy preserving auctions and mechanism design[C]//EC '99:Proceedings of the 1st ACM Conference on Electronic Commerce.New York:ACM,1999:129-139.
  • 2NAOR M,PINKAS B.Oblivious transfer and polynomial evaluation[C]//STOC '99:Proceedings of the 31st Annual ACM Symposium on Theory of Computing.New York:ACM,1999:245-254.
  • 3STADLER M,PIVETEAU J M,CAMENISCH J.Fair blind signature[C]//EUROCRYPT'95:Proceedings of the 14th Annual International Conference on Theory and Application of Cryptographic Techniques.Berlin:Springer-Verlag,1995:209-219.
  • 4GOLDREICH O,MICALI S,WIGDERSON A.How to play ANY mental game[C]//STOC '87:Proceedings of the 19th Annual ACM Symposium on Theory of Computing.New York:ACM,1987:218-299.
  • 5RABIN M O.How to exchange secrets by oblivious transfer[R/OL].[2013-04-15].http://eprint.iacr.org/2005/187.pdf.
  • 6EVEN S,GOLDREICH O,LEMPEL A.A randomized protocol for signing contracts[J].Communications of the ACM,1985,28(6):637-647.
  • 7CHEN Y,CHOU J S,HOU X W.A novel k-out-of-n oblivious transfer protocols based on bilinear pairings[EB/OL].[2012-09-25].http://eprint.iacr.org/2010/027.pdf.
  • 8CHOU J S.A novel k-out-of-n oblivious transfer protocol from bilinear pairing[J].Advances in Multimedia:Special Issue on Web Services in Multimedia Communication,2012,2012:1-9.
  • 9CHU C K,TZENG W G.Efficient k-out-of-n oblivious transfer schemes[J].Journal of Universal Computer Science,2008,14(3):397-415.
  • 10MURUGESAN M,JIANG W,NERGIZ A E,et al.k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations[C]//CODASPY '11:Proceedings of the 1st ACM Conference on Data and Application Security and Privacy.New York:ACM,2011:169-178.

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部