首页 | 官方网站   微博 | 高级检索  
     

通用可组合安全计算的信任模型研究
引用本文:张妤,阴建强,胡杰. 通用可组合安全计算的信任模型研究[J]. 计算机应用, 2012, 32(5): 1371-1374
作者姓名:张妤  阴建强  胡杰
作者单位:1. 信息工程大学 电子技术学院,郑州 4500042. 郑州电子信息中等专业学校 电子信息系,郑州4501003. 装甲兵工程学院 院办公室,北京 100072
基金项目:国家863计划项目(2007AA01Z405)
摘    要:通用可组合(UC)安全计算的存在性需要刻画某种基础假定的信任模型的支持。针对国内对于UC安全计算的信任模型研究甚少的现状,研究了UC安全性的本质要求及其对UC安全计算的限制,得出了使用这些信任模型的根本原因,进而分析了国外用来刻画这些基础假定的信任模型的设计原理,比较了它们的异同和优缺点,并展望了未来的研究方向。

关 键 词:密码协议  通用可组合  安全计算  基础假定  信任模型  
收稿时间:2011-11-07
修稿时间:2011-12-26

Research on trust model of universally composable security computation
ZHANG Yu , YIN Jian-qiang , HU Jie. Research on trust model of universally composable security computation[J]. Journal of Computer Applications, 2012, 32(5): 1371-1374
Authors:ZHANG Yu    YIN Jian-qiang    HU Jie
Affiliation:1. Institute of Electronic Technology, Information Engineering University, Zhengzhou Henan 450004, China
2. Department of Electronic Information, Zhengzhou Electronic Information Specialized Secondary School, Zhengzhou Henan 450100, China
3. Academic Office, Academy of Armored Forces Engineering, Beijing 100072, China
Abstract:A trust model capturing some set-up assumptions is necessary to guarantee the existence of Universally Composable(UC) security computation.Little domestic research on the trust model of UC security computation has been made.In this paper,the essential requirement of UC security and its limitation on UC security computation were researched to find out why these set-up assumptions were used.And then overseas representative trust models were analyzed and their merits and demerits were compared respectively.Finally,the research trend in future was pointed out.
Keywords:cryptographic protocol  Universally Composable(UC)  security computation  set-up assumption  trust model
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号