期刊文献+

敌手信道模型中的安全消息传输

Secure Message Transmission over Adversarial Channel Model
在线阅读 下载PDF
导出
摘要 以往对信息论安全的消息传输(SMT)协议的研究总假定有些信道完全保密且没有任何噪音,不能反映实际应用情况。为此提出敌手信道模型,不仅允许攻击者能完全控制t<n条连接Alice和Bob的信道,还允许他通过引入噪音来篡改其他n-t条信道中的部分消息。在该模型中分析常用的纠错码无法直接用于消息恢复的原因,并利用已有的信息协商协议设计一个敌手信道模型中的SMT协议。相比于以往的协议,该协议只增加很小的计算和通信开销,且具有最优的轮复杂性。 The existed model on information-theoretically Secure Message Transmission(SMT) assumes t〈n of the channels connecting Alice and Bob can be controlled by a computationally unbounded adversary, while the rest n-t channels are completely secure and no noise. However, the existence of channels without noise is only reasonable in ideal scenarios. For this reason, a model, called adversarial channel model, is introduced to study the SMT problem. The adversary, under the new model, is not only allowed to control any t〈n channels, but also allowed to partially affect the rest n-t channels by introducing noises at her will. The cause that general error-correcting codes may fail to recover messages is analyzed, and then by the help of information reconciliation protocol, a new SMT protocol is presented, which is efficient in both computational and communicational complexity, and optimal in round complexity.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第2期16-19,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z428) 国家自然科学基金资助项目(60673075)
关键词 信息论安全 安全消息传输 敌手信道 information theuretical security Secure Message Transmission(SMT) adversarial channel
作者简介 石兹松(1978-),男,博士研究生,主研方向:密码学,E-mail:hongsongshi@gmail.com 秦志光,教授、博士生导师
  • 相关文献

参考文献6

  • 1姜正涛,刘建伟,王育民.Paillier-Pointcheval公钥概率加密体制的改进[J].计算机工程,2008,34(3):38-39. 被引量:5
  • 2Kurosawa K, Suzuki K. Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme[C]//Proc. of EUROCRYPT'08. New York, USA: Springer-Verlag, 2008: 324-340.
  • 3Shi H, Jiang S, Safavi-Naini R, et al. Optimal Secure Message Transmission by Public Discussion[C]//Proc. of the International Symposium on Information Theory. Seoul, Korea:[s. n.], 2009: 1313-1317.
  • 4Smith A. Scrambling Adversarial Errors Using Few Random Bits[C]//Proc. of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms. New Orleans, USA: [s. n.], 2007: 395-404.
  • 5Cramer R, Dodis Y, Fehr S, et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors[C]//Proc. of EUROCRYPT'08. New York, USA: Springer-Verlag, 2008:471-488.
  • 6Patra A, Choudhary A, Srinathan K, et al. Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality[EB/OL]. (2008- 01-04). http://eprint.iacr.org/2008/141 .pdf.

二级参考文献5

  • 1Paillier P, Pointcheval D. Efficient Public-key Cryptosystem Provably Secure Against Active Adversaries[C]//Proc. of Advances in Cryptology-ASIACRYPT'99. Berlin: Springer-Verlag, 1999:163-179.
  • 2Okamoto T, Uchiyama S. A New Public Key Cryptosystem as Secure as Factoring[C]//Proc. of Advances in CryptologyEUROCRYPTO' 98. [S. l .]: Springer-Verlag, 1998:309-318.
  • 3Catalano D, Gennaro R, Graham N H. The Bit Security of Paillier'Secryption Scheme and Its Applications[C]//Proc. of Advances in Cryptology-EUROCRYPTO'01. [S. l.]: Springer-Verlag, 2001: 229-243.
  • 4Fishli R, Schnorr C P. Stronger Security Proofs for RSA and Rabin Bits[J]. J. of Cryptology, 2000, 13(2): 221-244.
  • 5Paillier P. Public-key Cryptosystem Based on Composite Degree Residuosity Classes[C]// Proc. of Advances in CryptologyEUROCRYPTO' 99. [S. l.]: Springer-Verlag, 1999: 223-238.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部