期刊文献+

辫群上的非平衡比特承诺协议

Biased bit commitment protocol over braid groups
在线阅读 下载PDF
导出
摘要 为构造抗量子攻击的密码协议,以非交换的辫群为平台,基于求根问题的难解性提出了一个非平衡比特承诺协议。分析表明,协议具有绑定性和隐藏性,且协议执行过程不涉及共轭判断运算,在计算上比基于共轭搜索问题的比特承诺协议更有效。 In order to construct quantum attack-resistant cryptographic protocols, non-commutative braid group is used as a new platform. This paper proposed a biased bit commitment protocol on base of the difficulty of root extraction problem over braid groups. Analysis shows that the proposed protocol is binding and hiding. And it is much more efficient in computation than the protocol based on since it needs no conjugacy decision operation.
出处 《计算机应用研究》 CSCD 北大核心 2012年第3期1076-1077,1083,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10501053)
关键词 辫群 比特承诺 求根问题 共轭搜索问题 braid group bit commitment root extraction problem(REP) conjugacy search problem(CSP)
  • 相关文献

参考文献26

  • 1SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [ J ]. SIAM Journal of Computer, 1997,5 : 1484-1509.
  • 2KITAEV A. Quantum measurements and the abelian stabilizer prob- lem[ EB/OL]. [2011-08-15 ]. http://arxiv, org/quant-ph/9511026.
  • 3HASHIMOTO Y, SAKURAI K. On the construction of signature schemes based on birational permutations over noncommutative rings [ EB/OL]. [2011-08-15 ]. http://eprint, iacr. org/2008/340.
  • 4OGURA N, UCHIYAMA S. Cryptanalysis of the birational permuta- tion signature scheme over a noncommutative ring[ EB/OL]. [ 2011- 08-15 ]. htto ,//eDrint. iacr.org/2009/066.
  • 5ARTIN E. Theory of braids[ J ]. Annals of Math, 1947,48 (2) : 101 - 126.
  • 6KO K H, LEE S J, CHEON J H,et al. New public key cryptosystem using braid groups[ C ]//Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2000 : 166-183.
  • 7ANSHEL I, ANSHEL M, FISHER B,et al. New key agreement pro- tocol in braid group cryptography [ C ] //Lectures Notes in Computer Science. Berlin : Springer-Verlag 2001 : 1-15.
  • 8CHA J C, KO K H, LEE S J, et al. An efficient implementation of braid groups [ C ] //Lecture Notes in Computer Sciencel Berlin: Springer-Verlag ,2001 : 144-156.
  • 9SIBERT H, DEHORNOY P, GIRAULT M. Entity authentication schemes using braid word reduction [ EB/OL]. [ 2011-08-15 ]. ht- tp ://eprint. iacr. org/2002/187.
  • 10LAL S, CHATURVEDI A. Authentication schemes using braid groups [ EB/OL ]. [ 2011-08-15 ]. http ://arXiv. org/cs. CR/0507066.

二级参考文献43

  • 1Smith R G. The Contract Net Protocol: High Level Communication and Control in a Distributed Problem Solver[J]. IEEE Trans. on Computer, 1980, 29(12): 357-366.
  • 2Ohko T, Hiraki K, Anzai Y. Reducing Communication Load on Contract Net by Case-based Eavesdropping for Utilizing' Message Leakage[C]//Proceedings of IEEE IROS'97. [S. l.]: IEEE Press, 1997: 1430-1436.
  • 3Ohko T, Hiraki K, Anzai Y. LEMMING: A Learning System for Multi-robot Environments[C]//Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems. Yokohama, Japan: [s. n.], 1993.
  • 4Deshpande U, Gupta A. Performance Improvement of the Contract Net Protocol Using Instance Based Learning[C]//Proc. of IWDC'03. Kolkata, India: Springer, 2003.
  • 5Jun Lee Kyoung, Time-bound Negotiation Framework for Electronic Commerce Agents[J]. Decision Support Systems, 2000, 28(4): 319- 331.
  • 6Sim Kwang Mong. Simulation of a Multi-Agent Protocol for Task Allocation in Cooperative Design[J]. IEEE Transactions on COmputer, 1999, 47(1): 95-100.
  • 7[1] David M.Goldschiag and Stuart G.Stubblebine.Prblically verfiable lotteries:financial Cryptography(FC'98) [C]:Preproceedings,Anguilla BWI,February,1998:214-226,Final proceedings forthcoming from Springer-Verlag.
  • 8[2] David Wheeler.Transactions using bets [A].In security protocols:4th International Workshop [C].M.Lomas(ed),Springer-Verlag,LNCS 1189:89-92,1996.
  • 9[3] Paul Syverson.Weakly secret bit commitment:Applications to lotteries and fair exchange [A].In Proceedings of 1998 IEEE Computer Secutity Foundations Workshop [C],Rockport Massachsetts;211-326,June,1998.
  • 10[4] Ronald L.Rivest.Electronic lottery tickets as micropayments [A].In Financial Cryptography:FC'97 [C],Proceedings,R.Hirschfeld (ed.),Springer-Verlag,LNCS,1998,1318:307-314.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部