透過您的圖書館登入
IP:3.19.63.106
  • 學位論文

多人合作私密計算上的安全性分析

Secrecy Analysis of Multiparty Private Computation

指導教授 : 劉邦鋒

摘要


傳統密碼學為了克服安全通道(secure channel)的不存在而產生了非對性的加解密系統。然而在這個系統下,我們唯一不信任的只是竊取資料的第三者,對於兩造雙方我們則給予完全的信任而與之合作。可是在真實的世界中,或許是商場上的競爭我們必需合作謀求最大利益,但卻又不時想從接收到的資料中盡其可能的獲取最多的資訊;也或許是兩造雙方都是可信的,但我們不知道對方的電腦是否中毒了,是否系統被植入後門而被竊取合作計劃目的之外的額外資訊。往往連對方都是不可完全信任的。 在現段的研究中,已經有許多的演算法能夠在雙方不完全透露自己資訊的情況下達到彼此的合作的目的,但並沒有太多有系統的分析方式能明確的比較出何種演算法較好,可以安全到什麼程度?而本論文的目的即在建立一個,能有系統的分析多人合作私密計算演算法的安全性,進而量化它,並找到演算法中可以安全達到的最高程度。

並列摘要


In traditional cryptography, if we want to do some private cooperative computation, one should totally trust the others, and reveals all of this private information to do the co-computation. These algorithms prevent only malicious third-party from security risk. However, the co-worker is not to be trusted in many real case. Nowadays, many algorithms have developed to overcome this risk. Co-operative can be achieved without reveal all of the information one have. This framework is to build an analytical model to measure the security of such algorithms and to find their degree of security.

參考文獻


[2] A. C. Yao, “Protocols for secure computation,” in the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982.
[3] W. Du and M. J. Atallah, “Protocols for secure remote database access with approximate matching,” 2000.
[6] F. Beauregard, Linear Algebra. Addison Wesley, 3rd ed., 1995.
[9] N. Abramson, Information Theory and Coding. Information theory and coding, 1983.
[10] W. Du and M. J. Atallah, “Privacy-preserving cooperative scientific computations,” in 14th IEEE Computer Security Foundations Workshop, (Nova Scotia, Canada), pp. 273–282, June 11-13 2001.

延伸閱讀