首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信保密与通信安全论文--理论论文

线性映射在安全协议中的应用研究

摘要第5-7页
ABSTRACT第7-8页
缩略语对照表第11-15页
Chapter 1 Introduction第15-23页
    1.1 Motivations第17-20页
        1.1.1 Motivation for Verifiable Computation第18-19页
        1.1.2 Motivation for Identity-based (Proxy) Re-encryption第19-20页
        1.1.3 Motivation for Secure Multi-party Computation第20页
    1.2 Contributions第20-22页
    1.3 Organizations第22-23页
Chapter 2 Preliminaries第23-27页
    2.1 Pairing Related Preliminaries第23-24页
    2.2 Other Non-Pairing Preliminaries第24-27页
Chapter 3 Enhancing Verifiable Computation Schemes with Input Privacy and Func-tion Privacy第27-47页
    3.1 Introduction第27-31页
        3.1.1 Background第27-28页
        3.1.2 Our Aim and Technique第28-30页
        3.1.3 Related Work第30-31页
    3.2 Definition and Notation第31-33页
        3.2.1 Verifiable Computation and Its Security第31-32页
        3.2.2 Circuit Definitions第32-33页
    3.3 Construction Ⅰ:IPE-based VC Scheme with Input Privacy and Function Privacy第33-38页
        3.3.1 Main Construction第33-35页
        3.3.2 Analysis of the Construction第35-38页
    3.4 Construction Ⅱ:ABE-based VC Scheme Supporting General Circuits第38-45页
        3.4.1 Abstract Description第38-39页
        3.4.2 Analysis of the Construction第39-40页
        3.4.3 Concrete Instantiation第40-43页
        3.4.4 Techniques to Make Construction Ⅱ(Weak) Input Privacy第43-45页
    3.5 Summary第45-47页
Chapter 4 Lightweight Universal Single-Hop and Multi-Hop Identity-Based Re-encryption第47-65页
    4.1 Introduction第47-50页
        4.1.1 Background第47-48页
        4.1.2 Motivation第48-49页
        4.1.3 Related Work第49-50页
    4.2 Definition and Notation第50-51页
    4.3 Construction Ⅰ第51-58页
        4.3.1 Description of the Main Scheme第52-54页
        4.3.2 Analysis of Construction Ⅰ第54-58页
    4.4 Construction Ⅱ第58-63页
        4.4.1 Description of the Main Scheme第58-62页
        4.4.2 Analysis of Construction Ⅱ第62-63页
    4.5 Summary第63-65页
Chapter 5 Two Secure Three-Party Computation Protocols for Triangle Area without Pairings第65-89页
    5.1 Introduction第65-69页
        5.1.1 Background第65-67页
        5.1.2 Motivations for Cryptographic Schemes without Pairings第67页
        5.1.3 Related Work第67-69页
    5.2 Definition and Notation第69-72页
    5.3 Protocol 1:Calculating the Triangle Area While Preserving the Coordinate Privacy from Heron's Formula第72-75页
        5.3.1 Protocol Intuition第72-73页
        5.3.2 Formal Specification of Protocol П第73-75页
    5.4 Proof of Security for Protocol 1第75-82页
        5.4.1 Definition of the Original Game第75-76页
        5.4.2 Proof Intuition第76-77页
        5.4.3 Security Games第77-79页
        5.4.4 Indistinguishability of Game_i and Game_(i+1)第79-82页
    5.5 Protocol 2:More Efficient Protocol from Shoelace Theorem第82-87页
        5.5.1 Formal Description of Protocol П_2第82-83页
        5.5.2 A Brief Sketch of Security Proof第83-84页
        5.5.3 Analysis and Discussion第84-87页
    5.6 Summary第87-89页
Chapter 6 Conclusion and Future Works第89-91页
    6.1 Conclusion第89-90页
    6.2 Future Works第90-91页
Bibliography第91-103页
Acknowledgements第103-105页
作者简介第105-106页

论文共106页,点击 下载论文
上一篇:稀疏数据恢复的结构优化模型及其算法研究
下一篇:追踪与广义近似消息传递