期刊文献+

扩展汉明码信息协调协议 被引量:3

Extended Hamming Code Information Reconciliation Protocol
原文传递
导出
摘要 提出了一种基于扩展汉明码与奇偶校验和的信息协调协议-扩展汉明码信息协调协议,分析了此协议的安全性与效率.与Winnow协议相比较,新协议具有原始密钥串初始误码率适用范围较大,迭代轮数较少和安全性高的优点. Based on extended Hamming code and the exchange of parity,a new information reconciliation protocol,i.e.extended Hamming code information reconciliation protocol,is presented,and its security and efficiency are analyzed.Compared with Winnow protocol,the new protocol has the advantage of greater initial error rate scope of application,fewer iterations and higher security.
出处 《西南大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第3期114-117,共4页 Journal of Southwest University(Natural Science Edition)
基金 贵州省科学技术基金项目(黔科合J字LKS[2010]04号)
关键词 扩展汉明码 奇偶校验和 信息协调 Winnow协议 误码率 extended Hamming code parity information reconciliation Winnow protocol error rate
  • 相关文献

参考文献14

  • 1BENETT C H, BRASSARD G, ROBERT J M. Privacy Amplification by Public Discussion [J]. SIAM Journal on Computing, 1998, 17(2): 210-229,.
  • 2BENNETT C H, BRASSARD G. Quantum Cryptography: Public=Key Distribution and Coin Tossing EC~//Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. New York: IEEE, 1984 : 175179.
  • 3郭光灿.量子信息技术[J].重庆邮电大学学报(自然科学版),2010,22(5):521-525. 被引量:16
  • 4ZBINDEN H, GISIN N, HUTTNER B, et al. Practical Aspects of Quantum Cryptographic Key Distribution [J]. Cryp tology, 2000, 13(2): 207-220.
  • 5BENNETT C H, BESSETTE F, BRASSARD G. Experimental Quantum Cryptography [C] // Proceedings of Eurocrypt'90. Berlin: Springer-Varlag, 1990: 253-265.
  • 6GISIN N, RIBORDY G, TITTEL W, et al. Quantum Cryptography [J]. Reviews of Modern Physics, 2002, 74(1): 145-195.
  • 7NAKASSIS A, BIENFANG J, WILLIAMS C. Expeditious Reconciliation for Practical Quantum Key Distribution [C]//Defense and Security Symposium: Quantum Information and Computation II. Bellingham.. SHE, 2004:28 35.
  • 8BRASSARD G, SALVAIL I.. Secret Key Reconciliation by Public Discussion [C]// Proceedings of Eurocypt'94. Berlin: Springer Varlag, 1994: 410-423.
  • 9李方伟,孙逊.基于双线性对的域间认证与密钥协商协议[J].重庆邮电大学学报(自然科学版),2010,22(5):688-692. 被引量:1
  • 10BENNETT C H, BESSETTE F, BRASSARD G, et al. Experimental Quantum Cryptography [J]. Journal of Cryptolo gy, 1992, 5(1): 3-28.

二级参考文献49

共引文献19

同被引文献31

  • 1孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 2王标,朱文余,孙琦.基于剩余类环Z_n上圆锥曲线的公钥密码体制[J].四川大学学报(工程科学版),2005,37(5):112-117. 被引量:20
  • 3孙琦,朱文余,王标.环Z_n上广义圆锥曲线和公钥密码体系[J].四川大学学报(自然科学版),2007,44(2):213-220. 被引量:7
  • 4孙琦,彭国华,朱文余,等.环Zn上圆锥曲线RSA型公钥密码体系和抗小解密指数d攻击[C]//第九届中国密码学学术会议论文集.北京:中国科学技术出版社,2006:92-102.
  • 5BONEH D. Twenty Years of Attacks on RSA Cryptosystem [J].Notices Amer Math Soc, 1999, 46(2): 203-213.
  • 6RIVEST R L, SHAMIR A, ADLEMAN L. A Method For Obtaining Digital Signatures and Public Cryptosystems[J].CommunACM, 1978, 21(2): 120- 126.
  • 7KOYAMA K, MAURER U, OKAMOTO T, et al. New Public Key Schemes Based on Elliptic Curves over the Ring Zo [J].Lecture Notes in Computer Science, 1992, 576: 252-266.
  • 8WIENER M J. Cryptanalysis of Short RSA Secret Exponents [J].IEEE Transactions on Information Theory, 1990, 36(3): 553-558.
  • 9ZHENG Y L. Digital Signcryption or How to Achieve Cost (Signature Encryption) << Cost (Signature) + Cost(En- cryption) [C] //Advances in Cryptology-Crypto'97, LNCS 1294. Berlin: Springer-Verlag, 1997 : 165- 179.
  • 10RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret[C] //Advances in Cryptology-Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001: 552-565.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部