期刊文献+

不经意传输协议两种构造方法 被引量:1

Two Kinds of Method to Construct Oblivious Transfer Protocols
在线阅读 下载PDF
导出
摘要 不经意传输协议作为密码学的基础协议在实际生活中有很多应用,其构造方法分直接和间接构造两种。利用整数的t进制表示和DDH假设等概念,在Naor-Pinkas方案的基础上,给出了一个计算上更简单的协议间接构造方法,再借助现有公钥体制的同态性给出了不经意传输协议的直接构造方法。 As a fundamental cryptology protocol,oblivious transfer is applied abroad in practice. The methods to construct the protocol are divided into two kinds,direct and indirect. With the help of idea of the representation of integer in base t and the DDH assumption,it proposes a kind of indirect method to construct the protocol with lower computation complexity based on Naor- Pinkas's scheme,moreover,another kind of direct method is put forward in terms of the some public cryptosystems with homomorphism.
出处 《现代电子技术》 2007年第21期76-78,共3页 Modern Electronics Technique
关键词 不经意传输 同态加密 同态性 DDH假设 oblivious transfer homomorphic encryption homomorphism Decisional Diffie - Hellman assumption
  • 相关文献

参考文献9

  • 1Rabin M O.How to Exchange Secrets by Oblivious Transfer,Tech.Aiken Computation Laboratory.Memo TR-81,1981.
  • 2Even S,Goldreich O,Lempel A.A Random Protocol for Sign contracts,Communication of the ACM28,1985:218-229.
  • 3Wiesner S.Conjugate Coding,SIGACT News15,1983:78-88.
  • 4李夷磊,陈志德.基于不经意传输的数字产品交易机制[J].计算机工程,2004,30(24):32-34. 被引量:3
  • 5Wen Guey Tzeng.Efficient 1-out-n Oblivious Transfer Schemes.In David Naccache and Pascal Pailler,editor,Public Key Cryptography'2002,Volume 2274 of Lecture Notes in Computer Science,Pairs,France,Springer-Verlag,2002:159-171.
  • 6Moni Naor,Benny Pinkas.Oblivious Transfer with Adaptive Queries.Lecture Notes in Computer Science,1999:573-590.
  • 7Tzeng W.Efficient 1-out-n Oblivious Transfer Schemes[C].Proc PKC2002,LNCS 2274,2002:159-171.
  • 8毛剑,杨波,王育民.保护隐私的数字产品网上交易方案[J].电子学报,2005,33(6):1053-1055. 被引量:11
  • 9Cachin C,Micali S,Stadler M.Computationally Private Information Retrieval With Polylogarithmic Communication,Proc.Advances in Cryptology-Eurocrypt'99,Springr-Verlag LNCS 1592,1999:402-414.

二级参考文献16

  • 1Aiello B, Ishai Y, Reingold O. Priced Oblivious Transfer:How to Sell Goods. Lecture Notes in Computer Science,2001
  • 2Naor M. Pinkas B. Oblivious Transfer and Polynomial Evaluation.STOC, 1999:245-254
  • 3Naor M, Pinkas B. Oblivious Transfer with Adoptive Query. STOC,1999:573-590
  • 4Naor M,Pinkas B. Efficient Oblivious Transfer Protocols. SODA ,2001
  • 5Rabin M O. How Exchange Secrets by Oblivious Transfer. Computer Science Laboratory, Harvard, 1981: 88
  • 6Feng Bao, Robert H Deng. An efficient and practical scheme for privacy protection in the E-commerce of digital goods [A]. Proc. ICICS 2000[C]. LNCS 2015 ,Springer Verlag,2001. 162-170.
  • 7Zero-Knowledge System Inc [EB/OL]. http://www.zero-knowledge.com/.
  • 8Donal O' Mahony, Michael Peirece. Electronic Payment Systems[Ml.Artech House, 1997. 145-190.
  • 9B Aiello, Y lshai, O Reingold. Priced oblivious transfer: How to sell digital goods[A]. Advances in Cryptology-Eurocrypt 2001 [C]. LNCS 2045, Springer-Verlag,2001.119-135.
  • 10M Naor, B Pinkas. Oblivious transfer and polynomial evaluation[A].Proc. 31^st Ann [C]. ACM Symp, Theory of Computing, 1999. 245-254.

共引文献12

同被引文献5

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部