期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
航空集群机载网络Failure-Oblivious路由策略 被引量:1
1
作者 吕娜 潘颖 +2 位作者 朱梦圆 陈坤 方宇 《国防科技大学学报》 EI CAS CSCD 北大核心 2022年第1期156-168,共13页
航空集群机载网络作为集群成员间信息交互的纽带,其路由策略性能优劣直接影响信息传输实时性与可靠性,从而制约网络化集群作战效能发挥。考虑到航空集群机载网络具有诸多不确定性,为应对路由失效以及尽可能避免路由更新,从路由选择算法... 航空集群机载网络作为集群成员间信息交互的纽带,其路由策略性能优劣直接影响信息传输实时性与可靠性,从而制约网络化集群作战效能发挥。考虑到航空集群机载网络具有诸多不确定性,为应对路由失效以及尽可能避免路由更新,从路由选择算法的角度,在软件定义网络架构下提出Failure-Oblivious路由策略。与传统路由策略不同的是,该策略利用随机算法生成多条路由,能够在不进行路由失效预测的情况下应对路由随机失效问题。理论推导与仿真验证表明,该策略能够在保证通信时效性代价可控的基础上,降低航空集群机载网络路由失效风险。 展开更多
关键词 航空集群 机载网络 路由失效 oblivious路由策略 图嵌入
在线阅读 下载PDF
基于3D-Mesh网络的一种Oblivious路由算法 被引量:1
2
作者 王振江 段新明 《微电子学与计算机》 CSCD 北大核心 2018年第3期23-27,共5页
3D-Mesh就是三维片上网络中一种常见拓扑结构.本文针对3D-Mesh网络提出了一种新的高吞吐率的随机Oblivious路由算法(Double Plane Turn,DPT).DPT算法通过降维,将3D-mesh网络转化为两个互相垂直2Dmesh,然后在2D-mesh网络下使用01Turn路... 3D-Mesh就是三维片上网络中一种常见拓扑结构.本文针对3D-Mesh网络提出了一种新的高吞吐率的随机Oblivious路由算法(Double Plane Turn,DPT).DPT算法通过降维,将3D-mesh网络转化为两个互相垂直2Dmesh,然后在2D-mesh网络下使用01Turn路由算法.由于01Turn路由算法具有良好的平均情况下的网络吞吐率和不错的延时,通过仿真实验证明,和以往的路由算法在平均情况下的网络吞吐率相比,本算法都实现了较好的结果. 展开更多
关键词 3D-Mesh oblivious算法 平均情况网络吞吐率 DPT
在线阅读 下载PDF
Coherent attacks on a practical quantum oblivious transfer protocol
3
作者 Guang-Ping He 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第10期202-207,共6页
In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglemen... In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglement-based attacks can break the protocol. Here we further tighten the security bound, by showing that the protocol is insecure against 4-body entanglement-based attacks, while being immune to 3-body entanglement-based attacks. Also, increasing the number of qubits in the protocol is useless for improving its security. 展开更多
关键词 quantum cryptography quantum algorithm quantum oblivious transfer ENTANGLEMENT
原文传递
Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution
4
作者 Kejia Zhang Chunguang Ma +3 位作者 Zhiwei Sun Xue Zhang Baomin Zhou Yukun Wang 《Computers, Materials & Continua》 SCIE EI 2020年第9期1915-1928,共14页
Oblivious key transfer(OKT)is a fundamental problem in the field of secure multi-party computation.It makes the provider send a secret key sequence to the user obliviously,i.e.,the user may only get almost one bit key... Oblivious key transfer(OKT)is a fundamental problem in the field of secure multi-party computation.It makes the provider send a secret key sequence to the user obliviously,i.e.,the user may only get almost one bit key in the sequence which is unknown to the provider.Recently,a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution(QOKD)from the well-known expression of quantum key distribution(QKD).In this paper,a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities,where both of them just perform computational basis measurement for single photons.Then we show that the privacy for both of them can be protected,since the probability of getting other’s raw-key bits without being detected is exponentially small.Furthermore,we give the solutions to some special decision problems such as set-member decision and point-inclusion by announcing the improved shifting strategies followed QOKD.Finally,the further discussions and applications of our ideas have been presented. 展开更多
关键词 Quantum cryptography quantum computing PRIVACY-PRESERVING quantum oblivious key distribution set-member decision point-inclusion decision
在线阅读 下载PDF
Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
5
作者 Jian Xu Zhihao Jiang +2 位作者 Andi Wang Chen Wang Fucai Zhou 《Computers, Materials & Continua》 SCIE EI 2018年第12期589-602,共14页
With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verifica... With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verification of cloud storage.Provable data possession(PDP)and Proofs of retrievablity(POR)are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments.The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have.Unfortunately,most of POR schemes support only static data.Stefanov et al.proposed a dynamic POR,but their scheme need a large of amount of client storage and has a large audit cost.Cash et al.use Oblivious RAM(ORAM)to construct a fully dynamic POR scheme,but the cost of their scheme is also very heavy.Based on the idea which proposed by Cash,we propose dynamic proofs of retrievability via Partitioning-Based Square Root Oblivious RAM(DPoR-PSR-ORAM).Firstly,the notions used in our scheme are defined.The Partitioning-Based Square Root Oblivious RAM(PSR-ORAM)protocol is also proposed.The DPOR-PSR-ORAM Model which includes the formal definitions,security definitions and model construction methods are described in the paper.Finally,we give the security analysis and efficiency analysis.The analysis results show that our scheme not only has the property of correctness,authenticity,next-read pattern hiding and retrievabiltiy,but also has the high efficiency. 展开更多
关键词 Cloud storage proofs of retrievability partitioning framework oblivious RAM
在线阅读 下载PDF
Quantum Oblivious Transfer with Reusable Bell State
6
作者 Shu-Yu Kuo Kuo-Chun Tseng +1 位作者 Yao-Hsin Chou Fan-Hsun Tseng 《Computers, Materials & Continua》 SCIE EI 2023年第1期915-932,共18页
In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contra... In cryptography,oblivious transfer(OT)is an important multiparty cryptographic primitive and protocol,that is suitable for many upperlayer applications,such as secure computation,remote coin-flipping,electrical contract signing and exchanging secrets simultaneously.However,some nogo theorems have been established,indicating that one-out-of-two quantum oblivious transfer(QOT)protocols with unconditional security are impossible.Fortunately,some one-out-of-two QOT protocols using the concept of Crepeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem,but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT.This paper proposes a novel and efficient one-out-of-two QOT which uses quantum resources directly instead of wasting unnecessary resources to generate classical keys.The proposed protocol is not covered by Lo’s no-go theorem,and it is able to check the sender’s loyalty and avoid the attack from the receiver.Moreover,the entangled state of the proposed protocol is reusable,so it can provide more services for the participants when necessary.Compared with otherQOT protocols,the proposed protocol is more secure,efficient,and flexible,which not only can prevent external and internal attacks,but also reduce the required resources and resource distribution time. 展开更多
关键词 Quantum cryptography information security quantum oblivious transfer bell State
在线阅读 下载PDF
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
7
作者 ZHANG Jianhong ZOU Wei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. 展开更多
关键词 oblivious transfer designated verifier EFFICIENCY
在线阅读 下载PDF
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
8
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 oblivious Transfer(OT) Access Control(AC) Identity-Based Encryption(IBE) Anonymous Key Issuing(AKI)
在线阅读 下载PDF
一种基于Torus网络的高效随机Oblivious路由算法
9
作者 任一曼 《软件工程》 2017年第1期12-14,8,共4页
一个好的路由算法应同时满足:最小的路由跳数以减小传输延时,保持通讯的局域性;最大的平均情况和最坏情况吞吐率;简单的路由器结构。随机Oblivious路由算法在低功耗并行计算机互联网络以及片上网络中得到广泛应用。针对Torus网络下已提... 一个好的路由算法应同时满足:最小的路由跳数以减小传输延时,保持通讯的局域性;最大的平均情况和最坏情况吞吐率;简单的路由器结构。随机Oblivious路由算法在低功耗并行计算机互联网络以及片上网络中得到广泛应用。针对Torus网络下已提出的Oblivious路由算法所需虚通道数目多的缺点,提出了随机Oblivious路由算法WRD,该算法仅使用两条虚拟通道即可实现算法的无死锁性。通过仿真对所提算法的性能进行了验证,结果表明,该算法与使用两条虚拟通道的O1TURN路由算法相比,WRD路由算法在所有通讯模式下的网络吞吐率均有所提升。与使用四条虚拟通道的RLB算法相比,新提出的WRD路由算法性能接近于RLB算法,甚至在多个通讯模式下的网络吞吐率要好于RLB算法,而且WRD路由算法仅使用两条虚拟通道,降低了网络系统成本和功耗。 展开更多
关键词 TORUS网络 随机oblivious路由算法 平均情况网络吞吐率 最坏情况网络吞吐率 虚拟通道
在线阅读 下载PDF
Distributed Oblivious Function Evaluation and Its Applications 被引量:2
10
作者 Hong-DaLi XiongYang +1 位作者 Deng-GuoFeng BaoLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期942-947,共6页
This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the h... This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. Keywords oblivious function evaluation - oblivious polynomial evaluation - secure multiparty computation - distributed - information security The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029.Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol.Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security.Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security.Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems. 展开更多
关键词 oblivious function evaluation oblivious polynomial evaluation secure multiparty computation DISTRIBUTED information security
原文传递
Oblivious Polynomial Evaluation 被引量:1
11
作者 Hong-DaLi Dong-YaoJi Deng-GuoFeng BaoLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期550-554,共5页
The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomial P(x) and the other party (Bob) with an input x wants to learn P(x) in such an oblivious way that Bob ... The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomial P(x) and the other party (Bob) with an input x wants to learn P(x) in such an oblivious way that Bob obtains P(x) without learning any additional information about P except what is implied by P(x) and Alice does not know Bob's input x. The former OPE protocols are based on an intractability assumption except for OT protocols. In fact, evaluating P(x) is equivalent to computing the product of the coefficient vectors (a(0),...,a(n)) and (1,...,x(n)). Using this idea, an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol. Compared with the existing OPE protocol, another characteristic of the proposed protocols is the degree of the polynomial is private. Another OPE protocol works in case of existence of untrusted third party. Keywords oblivious polynomial evaluation, oblivious transfer, secure multi-party computation, information. 展开更多
关键词 oblivious polynomial evaluation oblivious transfer secure multi-party computation information security
原文传递
Quantum security analysis of a lattice-based oblivious transfer protocol 被引量:3
12
作者 Mo-meng LIU Juliane KRAMER +1 位作者 Yu-pu HU Johannes BUCHMANN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1348-1369,共22页
Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely used as building blocks in secure multiparty computation and high-level protocols. The security of OT protocols built ... Because of the concise functionality of oblivious transfer (OT) protocols, they have been widely used as building blocks in secure multiparty computation and high-level protocols. The security of OT protocols built upon classical number theoretic problems, such as the discrete logarithm and factoring, however, is threatened as a result of the huge progress in quantum computing. Therefore, post-quantum cryptography is needed for protocols based on classical problems, and several proposals for post-quantum OT protocols exist. However, most post-quantum cryptosystems present their security proof only in the context of classical adversaries, not in the quantum setting. In this paper, we close this gap and prove the security of the lattice-based OT protocol proposed by Peikert et al. (CRYPTO, 2008), which is universally composably secure under the assumption of learning with errors hardness, in the quantum setting. We apply three general quantum security analysis frameworks. First, we apply the quantum lifting theorem proposed by Unruh (EUROCRYPT, 2010) to prove that the security of the lattice-based OT protocol can be lifted into the quantum world. Then, we apply two more security analysis frameworks specified for post-quantum cryptographic primitives, i.e., simple hybrid arguments (CRYPTO, 2011) and game-preserving reduction (PQCrypto, 2014). 展开更多
关键词 oblivious transfer Post-quantum Lattice-based Learning with errors Universally composable
原文传递
Unconditionally Secure Oblivious Polynomial Evaluation:A Survey and New Results 被引量:1
13
作者 Louis Cianciullo Hossein Ghodosi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第2期443-458,共16页
Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted ... Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted a lot of attention recently,as it has wide ranging applications in the field of cryptography.In this article we review some of these applications and,additionally,take an in-depth look at the special case of information theoretic OPE.Specifically,we provide a current and critical review of the existing information theoretic OPE protocols in the literature.We divide these protocols into two distinct cases(three-party and distributed OPE)allowing for the easy distinction and classification of future information theoretic OPE protocols.In addition to this work,we also develop several modifications and extensions to existing schemes,resulting in increased security,flexibility and efficiency.Lastly,we also identify a security flaw in a previously published OPE scheme. 展开更多
关键词 oblivious polynomial evaluation unconditionally secure information theoretic
原文传递
Universally composable oblivious transfer from ideal lattice
14
作者 Momeng LIU Yupu HU 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第4期879-906,共28页
As a fundamental cryptographic primitive, oblivious transfer (OT) is developed for the sake of efficient usability and combinational feasibility. However, most OT protocols are built upon some quantum non-immune crypt... As a fundamental cryptographic primitive, oblivious transfer (OT) is developed for the sake of efficient usability and combinational feasibility. However, most OT protocols are built upon some quantum non-immune cryptosystems by assuming the hardness of discrete logarithm or factoring problem, whose security will break down directly in the quantum setting. Therefore, as a subarea of postquantum cryptography, lattice-based cryptography is viewed as a promising alternative and cornerstone to support for building post-quantum protocols since it enjoys some attractive properties, such as provable security against quantum adversaries and lower asymptotic complexity. In this paper, we first build an efficient 1-out-of-2 OT protocol upon the hardness of ring learning with errors (RLWE) problem, which is at least as hard as some worst-case ideal lattice problems. We show that this 1-out-of-2 OT protocol can be universally composable and secure against static corruptions in the random oracle model. Then we extend it to a general case, i.e., 1-out-of-N OT with achieving the same level of security. Furthermore, on the basis of the above OT structure, we obtain two improved OT protocols using two improved lattice-based key exchange protocols (respectively relying on the RLWE problem and learning with errors (LWE) problem, and both achieving better efficiency by removing the Gaussian sampling for saving cost) as building blocks. To show that our proposed OT protocol indeed achieves comparable security and efficiency, we make a comparison with another two lattice-based OT protocols in the end of the paper. With concerning on the potential threat from quantum computing and expecting on the practical use of OT with high efficiency, an efficient post-quantum OT protocol is pressing needed. As shown in this paper, our proposed OT protocols may be considered as post-quantum OT candidates since they can both preserve provable security relying on lattice problems and enjoy practical efficiency. 展开更多
关键词 oblivious transfer universally COMPOSABILITY lattice-based CRYPTOGRAPHY LEARNING with ERRORS ring LEARNING with ERRORS random ORACLE model
原文传递
Secure oblivious transfer protocol from indistinguishability obfuscation
15
作者 Yuan Zheng Wang Mei Feng Xiao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期1-10,共10页
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e... A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO. 展开更多
关键词 indistinguishability obfuscation (iO) oblivious transfer (OT) protocol dual-mode cryptosystem
原文传递
从面向方面程序设计的定义到面向方面程序设计语言 被引量:9
16
作者 古思山 蔡树彬 李师贤 《计算机科学》 CSCD 北大核心 2011年第10期133-139,共7页
目前无论在学术界还是工业界,很多人士简单地将面向方面程序设计理解为模块化横切关注点,狭隘地认为面向方面程序设计构建在面向对象程序设计之上,是面向对象程序设计的扩展、有效的补充等。回顾了面向方面程序设计的定义,分析了面向方... 目前无论在学术界还是工业界,很多人士简单地将面向方面程序设计理解为模块化横切关注点,狭隘地认为面向方面程序设计构建在面向对象程序设计之上,是面向对象程序设计的扩展、有效的补充等。回顾了面向方面程序设计的定义,分析了面向方面程序设计区别于其它程序设计方法的本质特征,并形式化了定义中的量化语句与方面,给出了量化语句与方面的语义。重申了面向方面程序设计的本质特性是Quantification与Obliviousness,模块化横切关注点只是其带来的一个好处。同时指出了面向方面程序设计是一种新型的程序设计范式,独立于面向对象等其它程序设计方法。并且,基于此定义,给出了面向方面程序设计语言需满足的最小条件集,并比较了主流的面向方面程序设计语言,探讨了这些语言在面向方面程序设计理念上的差异。 展开更多
关键词 面向方面程序设计 面向方面程序设计语言 横切关注点 Quantification obliviousness
在线阅读 下载PDF
Multivariate basic function secret sharing from oblivious transfer
17
作者 Yanqing YAO Fangyuan MIN 《Frontiers of Computer Science》 2025年第10期123-137,共15页
Function secret sharing(FSS)is a secret sharing technique for functions in a specific function class,mainly including distributed point function(DPF)and distributed comparison function(DCF).As an important basis for f... Function secret sharing(FSS)is a secret sharing technique for functions in a specific function class,mainly including distributed point function(DPF)and distributed comparison function(DCF).As an important basis for function secret sharing,DPF and DCF are the foundation for the extension of this technique to other more general and complex function classes.However,the function classes corresponding to the current DPF and DCF schemes are almost all unary function classes,and there is no efficient construction for multivariate function classes.The applications of FSS can be extended with the development of a multivariate scheme,e.g.,a multi-keyword private information retrieval scheme can be constructed.To solve this problem,this paper presents a binary DCF scheme based on the“two-layer binary tree”structure.In a binary tree structure,each node computes the seed of its child nodes based on its own seed.The key technique is to realize the transition transfer of seeds by using oblivious transfer,to connect two unary structures.Theoretical analysis and experimental results show that our binary scheme changes from single-round communication in the original definition to multiround communication,and has great advantages in communication cost and computation efficiency.For the security parameterλand input length n,the key size is reduced from to O(λn^(2))to O(λn)In addition,we explore the extensions and applications of the above method.In the batch computation,this paper uses oblivious transfer(OT)extension to realize the one-time transmission of multiple pairs of seeds and optimize its communication efficiency.By extending the structure from“two-layer”to“multi-layer”,a secret sharing scheme of multivariate mixed basic function is proposed based on the serial thought.Furthermore,by employing the parallel thought,a general 2-layer FSS structure from OT for multivariate mixed basic functions is explored to enhance the efficiency,where the first layer is composed of d parallel binary trees with d representing the input dimension,and the second layer is one binary tree of depth d.And the applications of our schemes in multi-keyword private information retrieval are presented. 展开更多
关键词 function secret sharing binary distributed comparison function oblivious transfer multivariate basic function private information retrieval
原文传递
基于匈牙利算法评估路由算法中网络负载的方法
18
作者 张方爽 段新明 《软件工程》 2018年第6期14-16,共3页
最坏情况的吞吐率是衡量路由算法性能的重要因素之一。负载最重的地方是最坏情况吞吐率的体现,因此最坏情况的吞吐率在路由算法中很关键。在此基础上本文提出了通过利用匈牙利算法来评估网络负载的方法并且通过实验仿真进行比较。将匈... 最坏情况的吞吐率是衡量路由算法性能的重要因素之一。负载最重的地方是最坏情况吞吐率的体现,因此最坏情况的吞吐率在路由算法中很关键。在此基础上本文提出了通过利用匈牙利算法来评估网络负载的方法并且通过实验仿真进行比较。将匈牙利算法和穷举法运用到Oblivious路由中的O1TURN、VAL等算法中进行比较。实验结果表明运用该方法与利用传统的穷举法相比,可以大大减少计算量、降低时间复杂度,实验结果证明了方法的可行性和有效性。 展开更多
关键词 匈牙利算法 最坏情况吞吐率 oblivious路由 穷举法
在线阅读 下载PDF
Secure Two-Party Computational Geometry 被引量:37
19
作者 Shun-DongLi Yi-QiDai 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期258-263,共6页
Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a c... Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric. problems, and in doing so a building block is developed, the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems. 展开更多
关键词 secure multi-party computation oblivious transfer millionaire problem secure computation geometry PROTOCOL
原文传递
Quantum private query: A new kind of practical quantum cryptographic protocol 被引量:8
20
作者 Fei Gao SuJuan Qin +1 位作者 Wei Huang QiaoYan Wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2019年第7期10-21,共12页
This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in... This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in the protocol are introduced.Then, the advancements made in sability, theoretical security, and practical security are summarized. Additionally, we describe two new results concerning QPQ security. We emphasize that a procedure to detect outside adversaries is necessary for QPQ, as well as for other quantum secure computation protocols, and then briefly propose such a strategy. Furthermore, we show that the shift-and-addition or low-shift-and-addition technique can be used to obtain a secure real-world implementation of QPQ, where a weak coherent source is used instead of an ideal single-photon source. 展开更多
关键词 QUANTUM CRYPTOGRAPHY QUANTUM PRIVATE QUERY QUANTUM secure MULTIPARTY computation QUANTUM oblivious KEY transfer QUANTUM KEY distribution
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部