计算机工程与应用
計算機工程與應用
계산궤공정여응용
COMPUTER ENGINEERING AND APPLICATIONS
2014年
24期
81-85
,共5页
周文钦%张也弛%石润华
週文欽%張也弛%石潤華
주문흠%장야이%석윤화
密码编码学%安全多方计算%匿名认证%线性方程组
密碼編碼學%安全多方計算%匿名認證%線性方程組
밀마편마학%안전다방계산%닉명인증%선성방정조
cryptography%secure multiparty computation%anonymous authentication%linear equations
把匿名认证抽象为一个具体的安全多方计算问题,转而寻求对该具体问题的求解。基于线性方程组的求解理论,构建了一个匿名认证模型。继而设计了一个两方安全计算矩阵与向量乘积协议,并基于该协议提出了一个完整的匿名认证方案。该方案安全、高效,存储开销小,特别适宜于资源受限的设备或网络。
把匿名認證抽象為一箇具體的安全多方計算問題,轉而尋求對該具體問題的求解。基于線性方程組的求解理論,構建瞭一箇匿名認證模型。繼而設計瞭一箇兩方安全計算矩陣與嚮量乘積協議,併基于該協議提齣瞭一箇完整的匿名認證方案。該方案安全、高效,存儲開銷小,特彆適宜于資源受限的設備或網絡。
파닉명인증추상위일개구체적안전다방계산문제,전이심구대해구체문제적구해。기우선성방정조적구해이론,구건료일개닉명인증모형。계이설계료일개량방안전계산구진여향량승적협의,병기우해협의제출료일개완정적닉명인증방안。해방안안전、고효,존저개소소,특별괄의우자원수한적설비혹망락。
This paper takes anonymous authentication as a special secure multi-party computation problem and turns to the solution of this problem. This paper constructs an anonymous authentication model based on the basic theory of solving linear equations. A secure two-party multiplication protocol of matrix and vector is presented, and further the whole anon-ymous authentication scheme is proposed based on this multiplication protocol. The proposed scheme is secure and effi-cient, and it is very adaptable for resource-constrained devices or networks since its storage cost is low.