dc.contributor.advisor | 左瑞麟 | zh_TW |
dc.contributor.advisor | Tso, Ray Lin | en_US |
dc.contributor.author (Authors) | 邱士峰 | zh_TW |
dc.contributor.author (Authors) | Ciou, Shih Fong | en_US |
dc.creator (作者) | 邱士峰 | zh_TW |
dc.creator (作者) | Ciou, Shih Fong | en_US |
dc.date (日期) | 2011 | en_US |
dc.date.accessioned | 17-Apr-2012 09:16:53 (UTC+8) | - |
dc.date.available | 17-Apr-2012 09:16:53 (UTC+8) | - |
dc.date.issued (上傳時間) | 17-Apr-2012 09:16:53 (UTC+8) | - |
dc.identifier (Other Identifiers) | G0098753017 | en_US |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/52776 | - |
dc.description (描述) | 碩士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊科學學系 | zh_TW |
dc.description (描述) | 98753017 | zh_TW |
dc.description (描述) | 100 | zh_TW |
dc.description.abstract (摘要) | 本研究的研究目的是比較雙方秘密數值是否相等,而在以往的安全多方計算的研究,通常雙方的秘密數值經過協定之後,一個為告知方,另外一個為被告知方,由告知方通知計算後之結果,而被告知方只能相信此訊息。如果藉由半誠實的第三方可解決上述問題並減少計算量,但找到可以信任的第三方是比較不容易的。基於以上問題,本研究提出一新的秘密計算協定,在此協定下參與的雙方(告知方、被告知方)可以算出彼此所擁有的秘密是否相同。如果不同,此協定不會洩漏任何秘密值的資訊。本方案亦提供驗證機制,讓被告知方能驗證告知方是否屬實。 | zh_TW |
dc.description.abstract (摘要) | The purpose of this study is to compare the equality of two secret values. Securemultiparty computation in the previous study, usually through the protocol thetwo sides, the one is announcer and the other one be told. The one be told by theannouncer who notified the results of verification, and the one be told only canbelieve that the message. Through the semi-honest party can solve by the aboveproblems and reduce the computation required, but you can find a trusted thirdparty is not easy.Based on the above problems, this study proposed in the framework of both thesecret of a new calculation of protocol, in this protocol the two parties (the oneis announcer, the other one be told) can calculate each have a secret are equal ornot. If different, this protocol does not leak any information about the secretvalue. | en_US |
dc.description.tableofcontents | 摘要 IVAbstract V目錄 VI圖目錄 VIII表目錄 IX第一章 緒論 11.1 研究背景 11.2 研究動機與目的 31.3 研究貢獻 51.4 論文架構 6第二章 相關研究 72.1 近代密碼學簡介 72.1.1 對稱式金鑰密碼系統(Symmetric Key Cryptosystem) 72.1.2 非對稱式金鑰密碼系統(Asymmetric Key Cryptosystem) 92.2 同態公開金鑰加密(Homomorphic Encryption) 102.2.1 加法同態 102.2.2 乘法同態 122.3 可換式加密(Commutative Encryption) 142.4 語意安全(Semantic security) 162.5 雙重同態加密(Doubly-homomorphic Encryption) 172.6 安全秘密計算(在雙方架構下) 202.6.1 Yao 的協定 202.7 安全秘密計算(藉由半誠實的第三方) 242.7.1 半誠實的第三方(Semi-trust Third Party) 242.7.2 Co-operative Private Equality Test 25第三章研究方法 283.1 基礎協定設計 293.2 安全性 313.3 應用方面 33第四章 雙方相等性驗證機制 354.1 協定設定 364.2 驗證方法 404.3 安全分析 42第五章 效能分析 455.1 程式架構 46第六章結論 50參考文獻 51 | zh_TW |
dc.language.iso | en_US | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0098753017 | en_US |
dc.subject (關鍵詞) | 安全多方計算 | zh_TW |
dc.subject (關鍵詞) | 可換加密 | zh_TW |
dc.subject (關鍵詞) | 同態加密 | zh_TW |
dc.title (題名) | 具隱私保護功能之兩方相等性驗證機制之提案 | zh_TW |
dc.title (題名) | Two-party equality test with privacy protection | en_US |
dc.type (資料類型) | thesis | en |
dc.relation.reference (參考文獻) | [1]. D. Boneh, E. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. In Proceedings of Theory of Cryptography (TCC),2005, pp. 325-341. | zh_TW |
dc.relation.reference (參考文獻) | [2]. A. Beimel, T. Malkin, S. Micali. The all-or-nothing nature of two-party secure computation. In Proceedings of CRYPTO 99, 1999, pp. 80-97. | zh_TW |
dc.relation.reference (參考文獻) | [3]. E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, Vol.4, No.1, 1991, pp. 3-72. | zh_TW |
dc.relation.reference (參考文獻) | [4]. N. Courtois and J. Pieprzyk: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Asiacrypt ,2002, LNCS 2501, pp.267-287. | zh_TW |
dc.relation.reference (參考文獻) | [5]. B. Chevallier-Mames, J. Sebastien Coron, N. McCullagh, D. Naccache, and M.Scott. Secure delegation of elliptic-curve pairing. Cryptology ePrint Archive, 2005, pp.24-35. | zh_TW |
dc.relation.reference (參考文獻) | [6]. T. Chiang,W. Wang, J. Liau, and -S. Hsu. Secrecy of two-party secure computation. Lecture Notes in Computer Science, 2005, pp. 114-123. | zh_TW |
dc.relation.reference (參考文獻) | [7]. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, 1976, pp. 472-492. | zh_TW |
dc.relation.reference (參考文獻) | [8]. W. Du and Z. Zhan. A practical approach to solve secure multiparty computation problems. In Proceedings of New Security Paradigms Workshop, 2002, pp. 127-135. | zh_TW |
dc.relation.reference (參考文獻) | [9]. T. E. Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In proceedings of CRYPTO, 1985, pp. 10-18. | zh_TW |
dc.relation.reference (參考文獻) | [10].R. Fagin, M. Naor, P. Einkler, Comparing information without leaking it, Communications of the ACM 5 , 1996, pp.77-85. | zh_TW |
dc.relation.reference (參考文獻) | [11]. C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC ’09, ACM, 2009, pp. 169–178. | zh_TW |
dc.relation.reference (參考文獻) | [12].O. Goldreich, S. Micali and A. Wigderson, How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the 19th Annual | zh_TW |
dc.relation.reference (參考文獻) | ACM Symposium on Theory of Computing (STOC), 1987, pp. 218-229. | zh_TW |
dc.relation.reference (參考文獻) | [13]. S. Goldwasser and S. Micali. Probabilistic encryption and how to play mental poker keeping secret all partial information. In Proceedings of the 14th ACM Symposium on Theory of Computing (STOC’82), 1982, pp. 365–377. | zh_TW |
dc.relation.reference (參考文獻) | [14].R. Li and C. K.Wu, Co-operative private equality test. International Journal of Network Security, vol.1, no.3,2005, pp. 149-153. | zh_TW |
dc.relation.reference (參考文獻) | [15].D. Naccache and J. Stern. A new public key cryptosystem based on higher residues. In Proceddings of Computer and Communications Security (CCS), ACM, 1998, pp. 59-66. | zh_TW |
dc.relation.reference (參考文獻) | [16].C. P. Schnorr. E_cient Identi_cation and Signatures for Smart Cards. In Crypto `89, LNCS 435, 1990, pp. 235-251. | zh_TW |
dc.relation.reference (參考文獻) | [17].P. Paillier. Public-key cryptosystem based on composite degree residuosity classes. In Proceedings of Eurocrypt 99, 1999, pp. 223-238. | zh_TW |
dc.relation.reference (參考文獻) | [18].R. Rivest, A. Shamir, L. Adleman . A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2), 1978, pp. 120–126. | zh_TW |
dc.relation.reference (參考文獻) | [19].J. Vaidya and C. Clifton. Leveraging the ”Multi” in Secure Multi-Party Computation. In Proceedings of the Workshop on Privacy in the Electronic Society, 2003, pp. 53-59. | zh_TW |
dc.relation.reference (參考文獻) | [20].B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. (Wiley, 1996). | zh_TW |
dc.relation.reference (參考文獻) | [21].C. Yao, Protocols for secure computation. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science (FOCS), 1982, pp. 160-164. | zh_TW |
dc.relation.reference (參考文獻) | [22].F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In Proceedings of Public Key Cryptography (PKC) ,2004,pp. 277-290. | zh_TW |