用户名: 密码: 验证码:
Privacy-preserving two-party protocols.
详细信息   
  • 作者:Liu ; Xiaomin.
  • 学历:Doctor
  • 年:2010
  • 导师:Jarecki, Stanislaw M.,eadvisorTsudik, Gene Y.ecommittee memberGoodrich, Michael T.ecommittee member
  • 毕业院校:University of California
  • Department:Computer Science - Ph.D
  • ISBN:9781124209210
  • CBH:3422218
  • Country:USA
  • 语种:English
  • FileSize:2109703
  • Pages:181
文摘
As the world becomes increasingly dependent on electronic communication, and as such communication falls prey to various forms of surveillance, it is important to investigate whether cryptographic protocols which enable secure electronic communication can have privacy-protecting variants that are efficient enough for practical usage. In this thesis, we present two types of privacy-preserving protocols, namely private mutual authentication and privacy-preserving set intersection. A Private Mutual Authentication, or Secret Handshake, allows two parties to authenticate each other as certified by a certification authority specified in their authentication policy i.e. affiliated with the group managed by this certification authority), in a mutually private way, in the sense that the protocol leaks no information about either participant to a party which does not satisfy that participants authentication policy. In particular, the protocol hides what group this participant belongs to. And we say that the secret handshake is unlinkable if instances involving the same participant cannot be detected. We construct the two realizations of unlinkable secret handshake using OlogN) and O l) exponentiations and bilinear maps) respectively, where N is the maximum size of a group and l is the length of a groups revocation list. We also construct a linkable secret handshake protocol with On) exponentiations in the case when each player is affiliated with n authorities. A Privacy-Preserving Set Intersection protocol is a protocol executed between a sender and a receiver on respective sets of bitstrings X and Y of size N, which lets the receiver compute the intersection of X and Y without revealing anything else. We construct two privacy-preserving set intersection protocols with the computational cost of ON).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700