[1]杨晓莉,左祥建. 一种基于二次剩余的抛掷硬币方案[J].计算机技术与发展,2016,26(09):139-142.
 YANG Xiao-li,ZUO Xiang-jian. A Coin Toss Protocol Based on Quadratic Residue[J].,2016,26(09):139-142.
点击复制

 一种基于二次剩余的抛掷硬币方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年09期
页码:
139-142
栏目:
安全与防范
出版日期:
2016-09-10

文章信息/Info

Title:
 A Coin Toss Protocol Based on Quadratic Residue
文章编号:
1673-629X(2016)09-0139-04
作者:
 杨晓莉左祥建
 陕西师范大学 计算机科学学院
Author(s):
 YANG Xiao-li ZUO Xiang-jian
关键词:
 密码学安全多方计算硬币抛掷概率加密异或同态性
Keywords:
 cryptographysecure multi-party computationcoin tossprobabilistic encryptionXOR homomorphism
分类号:
TP309
文献标志码:
A
摘要:
 硬币抛掷在密码学和现实生活中都有重要的应用。比如篮球比赛或足球比赛,裁判用硬币抛掷的正反来决定哪边先开球。然后裁判抛掷硬币,如果硬币是正面,那么甲方从左往右攻;反之,乙方从左往右攻。这个实验就是一种简单的硬币抛掷协议。然而,对于不在同一地方的两人来说,如何公平地抛掷硬币,就是一个有待研究的问题了。研究了两方抛掷硬币的一个推广问题—多方抛掷硬币问题,构造了这个问题的解决方案。该方案基于Goldwasser-Micali概率加密算法的异或同态性和因子分子的困难性,对多人抛掷硬币的结果进行异或运算,实现了安全多方计算,保证了多人抛掷硬币的安全性和公平性。并对该方案进行了安全性分析和复杂度分析。
Abstract:
 The coin toss has important applications in both cryptography and information security. For example,in a basketball match or a football match,the referee decides which team to play first by the result of a coin toss,then judges the toss of a coin. If a coin is positive, the party A attacks from left to right;conversely,party B does from left to right. This experiment is a kind of simple coin drop agreement. However,for two people not in the same place,how to fairly toss a coin is a problem to be researched. Studies an extended problem of a coin toss:multi-party coin toss protocol,and constructs a solution to it. This scheme is based on the XOR homomorphism of Goldwasser-Micali probabilistic encryption algorithm and difficulty of factor molecules,and is exclusive or operation to the results of many people toss of a coin,guaranteeing the security and fairness in secure multiparty coin toss. It proves that these protocols are analyzed in security and complexity.

相似文献/References:

[1]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(09):151.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(09):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(09):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(09):43.
[11]马丽,窦家维,吴艳梅. 抛掷硬币方案研究[J].计算机技术与发展,2017,27(04):117.
 MA Li,DOU Jia-wei,WU Yan-mei. Investigation on Tossing Coin Scheme[J].,2017,27(09):117.

更新日期/Last Update: 2016-10-26