抗主动攻击的保密比较协议
作者:
作者单位:

作者简介:

李顺东(1963-),男,博士,教授,博士生导师,主要研究领域为信息安全,密码学;陈明艳(1996-),女,硕士,主要研究领域为信息安全,密码学;王文丽(1991-),女,博士,主要研究领域为信息安全,密码学;汪榆淋(1997-),女,硕士,主要研究领域为信息安全,密码学.

通讯作者:

李顺东,E-mail:shundong@snnu.edu.cn

中图分类号:

TP306

基金项目:

国家自然科学基金(61272435)


Comparing Protocol Against Active Attacks
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    互联网、物联网和大数据的迅速发展,为数据共享带来了无限的机遇,也给私有数据的隐私保护带来了严峻的挑战.安全多方计算是数据共享中隐私保护的关键技术,是密码学的一个重要研究方向,也是国际密码学界研究的热点.保密比较两个数的大小是安全多方计算的一个基本问题,是构建其他隐私保护协议的一个基本模块.当比较的数较小时,还没有可靠的能够抵抗主动攻击的保密比较问题解决方案.很多应用场景中的参与者可能会发动主动攻击,因为尚没有抗主动攻击的保密比较协议,这些场景中的保密比较问题还无法解决.因而研究抗主动攻击的保密比较问题解决方案有重要理论与实际意义.提出了一种加密-选择安全多方计算模式和编码+保密洗牌证明的抵抗主动攻击方法.在此基础上,设计了半诚实模型下安全的保密比较协议,用模拟范例证明了协议的安全性;分析了恶意参与者可能实施的主动攻击,结合ElGamal密码系统的乘法同态性、离散对数与保密洗牌的零知识证明设计阻止恶意行为的措施,将半诚实模型下安全的保密比较协议改造成抗主动攻击的保密比较协议,并用理想-实际范例证明了协议的安全性.最后分析了协议的效率,并通过实验验证协议是可行的.

    Abstract:

    The rapid development of the Internet, IOT, and big data brings great chance to share data owned by different entities, but it also brings severe challenge to privacy-preserving of private data. Secure multiparty computation is a key privacy-preserving technology, an important field of cryptography, and a focus of international cryptographic community. Privately comparing two numbers is a basic problem of secure multiparty computation. The protocols for this problem are building blocks to construct other privacy-preserving protocols. If the two numbers to be compared is small, there is no reliable solution to this problem that can resist active attacks. In many scenarios, the participants may be malicious and they may actively attack a protocol. If this is the case, there is no solution that can be used to privately compare the numbers. Therefore, it is of important theoretical and practical significance to design a protocol that can resist active attacks. This study first proposes a new technique called encrypt-and-choose and a new technology to resist active attacks:encoding+secure shuffle. Based on these techniques, a secure comparison protocol is first designed that is secure in the semi-honest model. Its security is proved by using the simulation paradigm. All possible active attacks are analyzed that the protocol may suffer from, and ElGamal multiplicative homomorphism and zero-knowledge proof of discrete logarithm and secure shuffle are used to resist possible active attacks. The protocol is then converted to one that can resist active attacks, and it is proved that it is secure against active attacks by using the ideal-real paradigm. Finally, the efficiency of the protocol is analyzed and tested. The experimental results demonstrate that the protocol is practical.

    参考文献
    相似文献
    引证文献
引用本文

李顺东,王文丽,陈明艳,汪榆淋.抗主动攻击的保密比较协议.软件学报,2022,33(12):4771-4783

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2020-11-18
  • 最后修改日期:2021-03-02
  • 录用日期:
  • 在线发布日期: 2022-12-03
  • 出版日期: 2022-12-06
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号