基于Cut-and-Choose技术的安全多方计算  被引量:2

Secure Multi-Party Computation Based on Cut-and-Choose Technology

在线阅读下载全文

作  者:赵川 徐俊 Zhao Chuan;Xu Jun(School of Information Science and Engineering,University of Jinan,Jinan 250022;Shandong Provincial Key Laboratory of Network-based Intelligent Computing(University of Jinan),Jinan 250022;Shandong Provincial Key Laboratory of Software Engineering(Shandong University),Jinan 250101)

机构地区:[1]济南大学信息科学与工程学院,济南250022 [2]山东省网络环境智能计算技术重点实验室(济南大学),济南250022 [3]山东省软件工程重点实验室(山东大学),济南250101

出  处:《计算机研究与发展》2022年第8期1800-1818,共19页Journal of Computer Research and Development

基  金:国家自然科学基金项目(61702218,61672262);山东省重点研发计划项目(2019GGX101028,2018CXGC0706);山东省自然科学基金项目(ZR2019LZH015);山东省高等学校科技计划项目(J18KA349);济南市高校自主培养创新团队项目(2018GXRC002)。

摘  要:Cut-and-Choose技术是密码学中一种被广泛使用的密码学工具,对安全多方计算协议的设计起着重要的作用.其主要思想是一方在协议中构造多份混淆电路,另一方要求打开其中一部分电路进行检查,若检查通过则计算剩余的电路,决定电路的最终输出.在早期工作中,Cut-and-Choose技术主要应用于恶意模型下的安全两方计算,并由此产生了许多优秀的工作.尽管该技术在隐蔽安全模型中的工作也很早提出,但在当时并没有引起太多的关注.近年来,随着学者对于隐蔽敌手的深入研究,Cut-and-Choose技术以及基于该技术的思想也开始被用于实现公开可验证的隐蔽安全协议,涌现出一些代表性的工作.首先介绍了Cut-and-Choose技术在恶意安全模型和隐蔽安全模型中的研究进展;其次重点介绍其应用于公开可验证隐蔽安全模型中的研究成果;最后通过对该领域的研究成果进行详细的总结与分析,并指出后续可能的发展方向.Cut-and-Choose is a widely used technique in cryptography,which plays an important role in the design of secure multi-party computation(MPC)protocols.The main idea of Cut-and-Choose is that one party constructs multiple copies of the objective garbled circuit,and the other party randomly chooses some of the circuits to be opened for correctness check.If the check passes,the parties evaluate the remaining circuits and determine the final output of the computation task.In the early research works,Cut-and-Choose was mainly used in MPC in malicious model,and a lot of excellent research results were proposed.Although this technology was also applied in the covert security model,it did not attract much attention at that time.In recent years,with in-depth research on covert adversaries,Cut-and-Choose technique and ideas based on this technique have also been used to obtain publicly verifiable covert secure MPC protocols.Some representative research works have emerged.In this work,we summarize the main research advance of Cut-and-Choose in malicious security model and covert security model,and present the achievements of this technology in the publicly verifiable covert security model.We make a detailed summary and analysis of relevant results in this research field and point out possible research directions in the future.

关 键 词:Cut-and-Choose技术 安全多方计算 混淆电路 恶意模型 隐蔽模型 公开可验证隐蔽模型 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象