期刊文献+

基于不经意传输的密码方案设计与对比分析

Design and Comparative Analysis of Cryptography Schemes Based on Oblivious Transfer
下载PDF
导出
摘要 随着数字化时代的发展,对数据安全和隐私保护的需求日益增加,基于不经意传输的密码方案作为一种重要的安全技术,保护数据安全和用户隐私方面发挥着重要作用。本文针对基于不经意传输的密码方案进行了设计与对比分析。首先,对数字产品交易、位置服务隐私保护和区块链数据保密查询等领域的应用需求进行了分析,在充分考虑其正确性、安全性和性能开销等方面的特点,计了满足相应安全和隐私保护要求的不经意传输方案;其次,对比分析了三种基于不经意传输的密码方案在安全性、功能、性能和实用性上的差异,为各个领域的实际应用提供了参考和指导;最后,总结了各方案的优缺点,并展望了自己未来基于不经意传输的密码方案的研究方向。 With the development in digital age,demand on data security and privacy protection is in⁃creasing.As an important security technology,cryptography scheme based on oblivious transfer plays a significant role in protecting data security and user privacy.In this paper,cryptography schemes based on oblivious transfer are designed and compared.First,application requirements are analyzed in fields of digital product transaction,location service privacy protection and blockchain data confidential que⁃ry,etc.With sufficient considerations of feasibility,security and performance overhead,oblivious transfer schemes that satisfy corresponding security and privacy protection requirements are designed.Then,three cryptography schemes based on oblivious transfer are compared in terms of security,func⁃tion,performance and practicability,which may provide reference and guide for practical applications in various fields.Finally,merit and demerit of each scheme is summarized,and future research direc⁃tion for cryptography scheme based on oblivious transfer is prospected.
作者 李春平 满子琪 张艳硕 刘冰 杨淑钰 LI Chunping;MAN Ziqi;ZHANG Yanshuo;LIU Bing;YANG Shuyu(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2024年第3期67-81,共15页 Journal of Beijing Electronic Science And Technology Institute
基金 中央高校基本科研业务费资金资助[3282023017] 北京市自然科学基金资助[No:4232034] “信息安全”国家级一流本科专业建设点资助。
关键词 不经意传输 隐私保护 数字产品交易 密码学 区块链保密查询 oblivious transfer privacy protection digital product trading cryptography blockchain confidential query
  • 相关文献

参考文献17

二级参考文献99

  • 1姜正涛,郝艳华,王育民.对不经意传输协议的分析[J].西安电子科技大学学报,2005,32(1):130-132. 被引量:2
  • 2赵春明,葛建华,李新国.基于RSA数字签名的增强不经意传输协议[J].西安电子科技大学学报,2005,32(4):562-565. 被引量:4
  • 3莫燕,张玉清,李学干.关于安全协议设计原则的研究[J].计算机工程,2005,31(24):183-185. 被引量:3
  • 4王芷玲,张玉清,杨波.公平交换协议设计原则[J].中国科学院研究生院学报,2006,23(4):555-560. 被引量:1
  • 5刘永杰,李芳,周玉洁.一种安全的三方公平电子合同方案[J].计算机应用研究,2007,24(1):170-173. 被引量:1
  • 6Micali S. Simple and Fast Optimistic Protocols for Fair Elecironic Exchange [C]//Proc. of Symposium on Principles of Distributed Computing. Boston: [s. n. ] ,2003 : 12 - 19.
  • 7Bao Feng,Wang Guilin, Zhou J ianying, et al. Analysis and Improvernent of Micali's Fair Contract Signing Protocol[ C]// Prec. of ICANN'04. Sydney: [ s. n. ],2004 : 176 - 187.
  • 8Pagnia H, Gartner C. On the Impossibility of Fair Exchange Without a Trusted Third Party[ R]. Darmstadt :Darmstadt University of Technology, 1999.
  • 9Goldwasser S, Micah, S, Rive.st R. A Digital Signature Scheme Secure Against Adaptive ChosenMessage Artaek[J ]. SIAM Journal of Computing, 1988,17(2) :281 - 308.
  • 10Ray I,Ray I. Fair exchange in E- commerce[J]. ACM SIGecorn Exchanges,2002,3(2) :9 - 17.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部