[1]马丽,窦家维,吴艳梅. 具有不可关联性的承诺方案[J].计算机技术与发展,2017,27(05):108-112.
 MA Li,DOU Jia-wei,WU Yan-mei. Non-malleable Commitment Schemes[J].,2017,27(05):108-112.
点击复制

 具有不可关联性的承诺方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年05期
页码:
108-112
栏目:
安全与防范
出版日期:
2017-05-10

文章信息/Info

Title:
 Non-malleable Commitment Schemes
文章编号:
1673-629X(2017)05-0108-05
作者:
 马丽窦家维吴艳梅
 陕西师范大学 数学与信息科学学院
Author(s):
 MA LiDOU Jia-weiWU Yan-mei
关键词:
 不可关联承诺离散对数假设哈希函数承诺函数
Keywords:
 non-malleable commitmentdiscrete logarithm assumptionhash functioncommitment function
分类号:
TP301
文献标志码:
A
摘要:
 承诺方案是密码学中的一个基本方案,在密码学中的其他协议中有重要的应用,比如:安全多方计算、加密方案、签名方案、密钥交换协议等.不可关联的承诺方案是国际密码学界的一个研究热点,是实现电子拍卖的理论基础,也是多方保密计算一个重要的模块.不可关联承诺方案在密码学与实际应用中有很多用途,目前的研究主要集中于提高不可关联承诺方案的安全性、效率以及减弱困难性假设等方面.因此,提出了两种不可关联承诺方案,能有效地阻止关联攻击和复制攻击,且与其他方案相比效率更高.两种不可关联承诺方案分别基于离散对数假设和哈希函数性质的合理应用,如果能成功实施关联攻击就能够计算离散对数,计算离散对数在密码学中是难解问题,随后给出了详细的安全性证明和效率分析.研究分析表明,不可关联承诺方案运用哈希函数作为承诺函数,效率以及安全性都比较高.
Abstract:
 Commitment scheme is a basic scheme in cryptography and has been important application in other agreements of cryptography like secure multi-party computation,encryption scheme,signature scheme,key exchange protocols and so on.Non-malleable commitment scheme is one focus in the international cryptographic community and the theoretical basis of electronic auction,which is also an important building block of secure multi-party computation and has important applications in cryptography and practice.At present,most studies focus on improving the security and the efficiency of non-malleable commitment schemes and less difficulty hypothesis,etc.So,two non-malleable commitment schemes are proposed which can efficiently prevent malleable attack and copy attack.These non-malleable commitment schemes are constructed based on discrete logarithm assumption and one-way hash function.If adversary can successfully attack the scheme,it can compute the discrete logarithm.The computing discrete logarithm in cryptography is a hard problem,and its security proving and efficiencies analysis are given.Study analysis shows that non associated commitment scheme using hash function as a commitment function,efficiency and security are relatively high.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(05):47.

更新日期/Last Update: 2017-07-07