全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

扩展代理多方计算及其协议

DOI: 10.13190/jbupt.201104.118.xuf, PP. 118-121

Keywords: 安全多方计算,代理多方计算,安全外包计算,安全求并集协议

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对安全多方计算中参与者无法执行协议的缺陷,提出了扩展代理多方计算模型.相对于已有的几种相关模型,该模型具有安全性更强的特点.从函数性、协议及协议安全性等方面形式化描述模型,并设计了该模型下的安全求并集协议,讨论和分析了该协议的效率、安全性与正确性.

References

[1]  Dijk M, Clarke D, Gassend B, et al. Speeding up exponentiation using an untrusted computational resource[J]. Designs, Codes and Cryptography, 2006, 39(2): 253-273.
[2]  Hohenbergera S, Lysyanskaya A. How to securely outsource cryptographic computations[J]. LNCS, 2005, 3378: 264-282.
[3]  Atallah M J, Keith B. Frikken securely outsourcing linear algebra computations//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing: , 2010: 481-496.
[4]  Akimanaa R, Markowitch O, Roggeman Y. Secure outsourcing of DNA sequences comparisons in a grid environment [J]. WSEAS Transactions on Computers Research, 2007, 2(2): 262-269.
[5]  Atallah M J, Li Jiangtao. Secure outsourcing of sequence comparisons[J]. International Journal of Information Security, 2005, 4(4): 277-287.
[6]  Loureiro S, Bussard L, Roudier Y. Extending tamper-proof hardware security to untrusted execution environments//CARDIS’02: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference. Berkeley: , 2002: 12-19.
[7]  Biget P. How smartcards can benefit from Internet technologies to break memory constraints//1st Gemplus Developer Conference. Paris: , 1999.
[8]  Damgrd I, Ishai Y. Constant-round multiparty computation using a black-box pseudorandom generator//Advances in Cryptology (CRYPT0 05), volume LNCS 3621. : Springer-Verlag, 2005: 378-394.
[9]  马敏耀. 安全多方计算及其扩展问题的研究. 北京: 北京邮电大学图书馆, 2010.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133