首页 | 本学科首页   官方微博 | 高级检索  
     

基于OT的多方匿名身份查询协议
引用本文:张爱娈,丁海洋,李祯祯,张珍珍,李子臣. 基于OT的多方匿名身份查询协议[J]. 计算机应用研究, 2022, 39(4): 1190-1194. DOI: 10.19734/j.issn.1001-3695.2021.09.0380
作者姓名:张爱娈  丁海洋  李祯祯  张珍珍  李子臣
作者单位:北京印刷学院 数字版权保护技术研究中心,北京 102600
基金项目:北京印刷学院博士启动基金资助项目;北京市教委科研计划资助项目;北京印刷学院校内学科建设项目;北京印刷学院校级重点教改项目;国家自然科学基金;北京市教委科研计划一般项目
摘    要:多方数据源的隐私信息安全检索是网络安全中亟待解决的问题,不经意传输技术的特点是能够保证各个参与方的数据安全,因此将不经意传输技术与密码学中的同态密码及对称密码相结合,设计了一种多方数据源匿名查询协议。首先,基于不经意传输的思想设计了一种三方匿名查询协议,给出了协议的模型及协议的具体流程。其次,对协议的正确性与安全性进行了证明与分析。最后,将三方匿名查询协议扩展到多方查询协议,并将其应用于数字产品交易中黑名单用户的验证,解决了在网络安全交易过程中买家用户恶意交易问题。实验数据表明,该算法在保证各方数据安全的情况下查询结果正确且效率高。

关 键 词:不经意传输  同态加密  对称加密  多方数据  网络交易
收稿时间:2021-09-06
修稿时间:2022-03-15

Multi-party anonymous identity query protocol based on OT
Zhang Ailuan,Ding Haiyang,Li Zhenzhen,Zhang Zhenzhen and Li Zichen. Multi-party anonymous identity query protocol based on OT[J]. Application Research of Computers, 2022, 39(4): 1190-1194. DOI: 10.19734/j.issn.1001-3695.2021.09.0380
Authors:Zhang Ailuan  Ding Haiyang  Li Zhenzhen  Zhang Zhenzhen  Li Zichen
Affiliation:Digital Copyright Protection Technology Research Center of Beijing Institute of Gtaphic Communication,,,,
Abstract:Privacy information security retrieval of multi-party data sources is an urgent problem in network security. The feature of oblivious transfer technology is to ensure the data security of each participant. Therefore, this paper combined oblivious transfer technology with homomorphic encryption and symmetric encryption in cryptography to design an anonymous query protocol for multi-party data sources. Firstly, based on the idea of oblivious transfer, this paper designed a three-party anonymous query protocol, and gave the model of the protocol and the specific process of the protocol. Secondly, this paper proved and analyzed the correctness and security of the protocol. Finally, it extended the three-party anonymous query protocol to the multi-party query protocol, and it applied to the verification of blacklist users in digital product transaction, which solved the problem of malicious transaction of buyer users in the process of network security transaction. Experimental data shows that the algorithm has correct query results and high efficiency under the condition of ensuring the data security of all parties.
Keywords:oblivious transfer   homomorphic encryption   symmetric encryption   multi-party data   network transaction
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号