北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2008, Vol. 31 ›› Issue (6): 5-8.doi: 10.13190/jbupt.200806.5.197

• 论文 • 上一篇    下一篇

映射相等问题的安全双方计算协议

马敏耀1, 罗守山1,2, 王励成1   

  1. (1. 北京邮电大学 灾备技术国家工程实验室, 北京 100876; 2. 北京邮电大学 软件学院, 北京 100876)
  • 收稿日期:2008-03-29 修回日期:2008-06-19 出版日期:2008-12-31 发布日期:2008-12-31
  • 通讯作者: 马敏耀

Secure Two-party Computation Protocols for Mapping-equivalence Problem

MA Min-yao1, LUO Shou-shan1,2, WANG Li-cheng1   

  1. (1.National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2.School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China)
  • Received:2008-03-29 Revised:2008-06-19 Online:2008-12-31 Published:2008-12-31
  • Contact: MA Min-yao

摘要:

安全多方计算协议是指拥有秘密输入的 方,在不泄漏各自秘密输入的前提下共同正确地计算1个函数,并且除了输出所反映的信息之外,任何一方的输入信息都不泄漏.基于可交换确定型加密体制, 在半诚实模型下给出了判断元素属于集合、集合相等及同一集合上的等价关系相等的安全双方计算协议.给出了利用核、像和核类来判断映射相等的方法,在此基础上进一步提出了判断映射相等的安全双方计算协议, 并对协议的正确性, 安全性和效率进行了说明.

关键词: 密码学, 安全多方计算, 等价关系, 映射, 有限全变换半群

Abstract:

Secure multi-party computation protocol allows a set of -parties to evaluate a joint function of their inputs such that the function is calculated correctly and furthermore no information about their inputs is revealed by the output of the function. Based on the determinate-commutative cryptosystem and under the semi-honest model hypothesis, secure two-party computation protocols for determine whether an element is belong to a certain finite set, whether two finite sets are equal, and whether two equivalence relations are equal are considered. A mathematic method, relates to kernel, image and kernel-classes of mapping, to determine whether two mappings are equal is introduced. Furthermore, two-party computation protocol for determine whether two mappings are equal is given. Correctness, security, and efficiency of our protocols are analyzed.

Key words: cryptography, secure two-party computation, equivalent relation, mapping, finite full transformation semigroup

中图分类号: