期刊文献+

基于非交互保密函数计算的移动代理保护

Mobile agent protection based on non-interactivesecure function evaluation
在线阅读 下载PDF
导出
摘要 通过优化不经意传输(OT)协议,提出一种基于非交互保密函数计算的移动代理保护新方案.根据OT协议的计算开销主要集中在密集的取幂运算,将OT协议由二选一扩展为多选一,把OT调用由多个二选一合并成单个多选一,在此基础上定义新的并发OT协议,使取幂运算次数减少为常数次.将该并发OT协议与加密电路构造组合,得到一个非交互保密函数计算协议.所有主机贡献出加密电路当中代表自己函数的部分,各个子电路进行级联,从而构造出最终的加密电路.与同类方案相比,新方案具有计算开销低、安全性更强、系统更容易实现等特点. A mobile agent protection scheme based on the non-interactive secure function evaluation was presented using an optimized oblivious transfer (OT) protocol. Most overheads of an OT protocol are modular exponentiations, which are computationally intensive tasks. The expansion from l-out-of-2 OT protocol to 1-out-of-N OT protocol and the combination of N l-out-of-2 OT protocol to one l-out-of-N OT protocol defined a new simultaneous 1-out-of-N OT protocol, where the number of modular exponentiation was consequently reduced to a small constant. The simultaneous OT protocol and the encrypted circuit construction were combined to obtain a non-interactive secure function evaluation protocol. Source host proceeded as Alice, and multiple hosts proceeded as Bob. Each host contributed the part of encrypted circuit that represented its function, thus the resulting encrypted circuit became a cascade of sub-circuits. It is proved that the scheme has lower overhead and more security, and is easier to implement than other similar systems.
作者 吴建军 高济
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2004年第7期848-850,887,共4页 Journal of Zhejiang University:Engineering Science
关键词 移动代理保护 保密函数计算 不经意传输协议 Network protocols Protection Security of data
  • 相关文献

参考文献6

  • 1SANDER T, TSCHUDIN C F. Protecting mobile agents against malicious hosts [A]. Mobile Agents and Security [C]. Berlin : Springer-Verlag, 1998: 44- 60.
  • 2CACHIN C, CAMENISCH J, KILIAN J, et al. Oneround secure computation and secure autonomous mobile agents [A]. Proceedings of ICALP'2000 [C].Berlin: Springer-Verlag, 2000: 512- 523.
  • 3YAO A C. How to generate and exchange secrets [A].Proceedings of the 27th FOCS [C]. New York: IEEE,1986: 162-167.
  • 4NAOR M, PINKAS B. Efficient oblivious transfer protocols [A]. Proceedings of SODA 2001, SIAM Symposium on Discrete Algorithms [C]. New York: ACM,2001 : 448-457.
  • 5BELLARE M, MICALI S. Non-interactive oblivious transfer and applications [A]. Proceedings CRYPTO '89 [C]. Berlin: Springer-Verlag, 1990: 547- 557.
  • 6CANETTI R, GOLDREICH O, HALEVI S, et al.The random oracle methodology [A]. Proceedings of 30th ACM Symposium on Theory of Computing [C].New York: ACM, 1998: 209-218.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部