期刊文献+

新的欺骗免疫秘密共享函数 被引量:1

A New Cheating Immune Secret Sharing Function
在线阅读 下载PDF
导出
摘要 介绍了欺骗免疫秘密共享函数的密码学模型,运用构造单射的方法构造了一类形如f(x,y)=x.π(y)的新的欺骗免疫秘密共享函数。同时给出了二次布尔函数为欺骗免疫的充要条件的结论,此结论是Josef Pieprzyk关于二次布尔函数为欺骗免疫的条件结论的改进和提升。 The eryptographie model of cheating immune secret sharing function is introduced. By using injeetive functions, it proposes a new method for the construction of cheating-immune secret sharing which has the form f(x, y) = x·x(y). It gives a sufficient and necessary condition for a quadratic Boolean function to be cheating-immune. It improves the conclusions given by Josef Pieprzyk.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第4期54-56,共3页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(90304007) 国家"973计划"项目(2004CB318004) 中国博士后科学基金项目(2005038390)
关键词 密码学 布尔函数 秘密共享 弹性函数 cryptography Boolean function secret sharing resilient function
  • 相关文献

参考文献6

  • 1秦素娟,刘太琳,温巧燕.基于纠缠交换和局域操作的量子秘密共享[J].北京邮电大学学报,2005,28(4):74-77. 被引量:8
  • 2张劼,刘振华,温巧燕.欺骗免疫秘密共享[J].北京邮电大学学报,2005,28(4):83-86. 被引量:6
  • 3Pieprzyk J, Zhang X M. On cheating immune secret sharing [J]. Discrete Mathematics and Theoretical Science, 2004, 6(2): 253-264.
  • 4Sarkar P, Highly S M. Nonlinear balanced boolean functions with important cryptographic properties [C]//EUROCRYPT 2000. Heidelberg: Springer-Verlag, 2001:485-506.
  • 5Pieprzyk J, Zhang X M. Constructions of cheating immune secret sharing [C] // ICISC 2001. Heidelberg: Springer-Verlag, 2002: 226-243.
  • 6Pieprzyk J, Zhang X M. Cheating prevention in secret sharing over GF(p^n) [C]//INDOCRYPT 2001. Heidelberg: Springer-Verlag, 2002: 79-90.

二级参考文献25

  • 1高飞,温巧燕.一种量子密钥分发和身份认证协议[J].北京邮电大学学报,2004,27(3):98-102. 被引量:10
  • 2温巧燕,高飞,朱甫臣.量子密钥分发中身份认证问题的研究现状及方向[J].北京邮电大学学报,2004,27(5):1-6. 被引量:11
  • 3GAOFei,WENQiao-yan,ZHUFu-chen.Quantum Key Distribution Based on Entangled States and Non-Orthogonal States[J].The Journal of China Universities of Posts and Telecommunications,2004,11(4):33-36. 被引量:3
  • 4Zhang Jie, Chang Zuling, Wen Qiaoyan. Further results of cheating immune secret sharing I J]. The Journal of China Universities of Posts and Communications, 2004,11(4): 26-28.
  • 5Pieprzyk J, Zhang X M. Cheating prevention in secret sharing over GF ( p' ) [ A ]. INDOCRYPT 2001 [ C ].2001. 79-90.
  • 6Stinson D R. Cryptography: theory and practice [ M].CRC Press, 1995.
  • 7Zhang X M, Zheng Y L. Cryptographically resilient functions[J]. IEEE Trans Inform Theory, 1997, 43:1740-1747.
  • 8Shamir A. How to share a secret[J]. Communications of theACM, 1979, 22(11): 612-613.
  • 9Blakley G R. Safeguarding cryptographic keys[A]. Proceedings of the National Computer Conference[C]. New York: AFIPS Press, 1979. 313-317.
  • 10Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing [C]. India: Bangalore Press, 1984.175-179.

共引文献12

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部