首页 | 本学科首页   官方微博 | 高级检索  
     

n取m不经意传输协议构造研究
引用本文:陈志德,朱洪.n取m不经意传输协议构造研究[J].小型微型计算机系统,2006,27(3):466-468.
作者姓名:陈志德  朱洪
作者单位:1. 复旦大学,计算机科学与工程系,上海,200433;复旦大学,智能信息处理开放实验室,上海,200433;福建师范大学,数学与计算机科学学院,福建,福州,350007
2. 复旦大学,计算机科学与工程系,上海,200433;复旦大学,智能信息处理开放实验室,上海,200433
基金项目:中国科学院资助项目;科技部"攀登计划";上海市科技发展基金;福建省自然科学基金
摘    要:不经意传输协议是设计其他密码协议的基础,同样,该协议在电子商务中也有很多应用.本文首先以2取1不经意传输协议作为子协议,构造n取1不经意传输协议,再以n取1不经意传输协议为子协议构造n取m不经意传输协议.最后,我们利用在公钥密码系统中,由公钥推导出私钥难这一性质,构造出2取1不经意传输协议,从而得出推论,任意的公钥密码系统都可以用来构造n取m不经意传输协议.

关 键 词:不经意传输  公钥密码系统
文章编号:1000-1220(2006)03-0466-03
收稿时间:07 6 2005 12:00AM
修稿时间:2005-07-06

Construction of m-out-of-n Oblivious Transfer
CHEN Zhi-de,ZHU Hong.Construction of m-out-of-n Oblivious Transfer[J].Mini-micro Systems,2006,27(3):466-468.
Authors:CHEN Zhi-de  ZHU Hong
Affiliation:1 Computer Science and Engineering Department, Fudan University, Shanghai 200433, China; 2 Key Laboratory of Intelligent Information Processing, Fudan University, Shanghai 200433, China; 3 School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, China
Abstract:Oblivious transfer(OT)is used as a key component in many applications of cryptography. In this paper, a1-out-of-n oblivious transfer is constructed based on the sub protocol 1-out-of-2 oblivious transfer;an m-out-of-n oblivious transfer is constructed based on the sub protocol 1-out-of-n oblivious transfer. Finally,a1-out-of-2 oblivious transfer is constructed based on public key system. By this way,any existed public key system can be used to construct m-out-of-n oblivious transfer.
Keywords:oblivious transfer  public key system
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号