• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (3): 58-65.

• 论文 • 上一篇    下一篇

一种恶意模型下高效的两方安全计算协议

杨勇   

  1. (中国电子科技集团公司第五十四研究所,河北 石家庄 050081)
  • 收稿日期:2012-03-01 修回日期:2012-06-08 出版日期:2013-03-25 发布日期:2013-03-25

An efficient  twoparty secure computation
protocol under the malicious model  

YANG Yong   

  1. (The 54th Institution,China Electronics Technology Group Corporation,Shijiazhuang 050081,China)
  • Received:2012-03-01 Revised:2012-06-08 Online:2013-03-25 Published:2013-03-25

摘要:

为了提高恶意参与者模型下两方安全计算协议的效率,文中协议使用了简单的轮换映射,这样不仅可以检测恶意参与方输入的一致性,而且避免了检测一致性时由于图的全连接性带来的复杂度,从而与经典协议相比效率提高了近50%。此外,为了使协议的安全性得到更好的保证,在理想/现实对模型下,本文采用回退的方法,在OT12协议完全可模拟和知识证明等性质的基础上,用现实模型模拟理想模型的方法,给出了协议完整、严格的形式化证明和失败率分析。

关键词: 算法, 安全计算, 恶意模型, 协议, 形式化证明, 安全性, 计算电路

Abstract:

For the sake of improving the efficiency of the secure twoparty computation protocol under the malicious model, this protocol uses the simple permutation projection. Therefore, it can not only check the input consistency of the malicious party , but also avoid the complexity of full connectivity when checking the input consistency. Compared with the classic protocol, it improves the efficiency by nearly 50%. Besides, in order to better guarantee the protocol security, under the ideal/real model, based on simulation of  OT12  protocol and the knowledge proof, the paper uses the rollback method to give a rigid formal proof and failure proof of the protocol.

Key words: algorithm;security computation;malicious model;protocol;formal proof;security;computing circuit