您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (07): 34-37.doi: 10.6040/j.issn.1671-9352.0.2013.634

• 论文 • 上一篇    下一篇

LWE求逆算法的门限方案

赵秀凤, 王爱兰, 汪翔   

  1. 解放军信息工程大学, 河南 郑州 450004
  • 收稿日期:2013-12-19 出版日期:2014-07-20 发布日期:2014-09-15
  • 作者简介:赵秀凤(1977- ),女,讲师,博士,研究方向为密码协议、格公钥密码体制.E-mail:zhao_xiu_feng@163.com
  • 基金资助:
    国家自然科学基金资助项目(61173139)

Threshold scheme for LWE inversion

ZHAO Xiu-feng, WANG Ai-lan, WANG Xiang   

  1. Information Engineering University, Zhengzhou 450004, Henan, China
  • Received:2013-12-19 Online:2014-07-20 Published:2014-09-15

摘要: 为了避免单点失效引起安全隐患,通常采用门限技术来增强密码系统的可靠性。其中,如何构造有效的容错学习(learing with error,LWE)求逆算法的门限方案被遗留为公开问题。提出了LWE求逆算法的门限方案T-LWE-Invert,该方案利用有限群上的秘密分享机制解决了陷门分享和LWE逆的计算问题。理论分析表明,T-LWE-Invert门限方案具有零知识可模拟性,并且与标准的LWE求逆算法具有相同的安全性。

关键词: 秘密分享, 门限密码体制, LWE求逆, 格密码体制

Abstract: To solve security risks caused by single-point failures, it is usually preferred to apply secret sharing/threshold technique to strengthen the reliability of cryptosystems. How to construct efficient threshold scheme for LWE inversion be left as open problem. A threshold scheme for LWE inversion, called T-LWE-Invert was first proposed, and it solves trapdoor share and it computes the LWE inversion by secret sharing scheme for additive group. Theoretical analysis indicates that this scheme achieves zero-knowledge simulatablity, so it is as secure as original LWE inversion algorithm.

Key words: threshold cryptography, secret share, LWE inversion, lattice-based cryptography

中图分类号: 

  • TP393
[1] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613.
[2] 张焕国,管海明,王后珍. 抗量子密码体制的研究现状[C]//中国密码学发展报告.北京:电子工业出版社,2010:1-31.
[3] AGRAWAL S, BONEH D, BOYEN X. Efficient lattice (H)IBE in the standard model[C]//Hernri Gilbert Eurocrypt 2010. Berlin:Springer-Verlag, 2010:553-572.
[4] LYUBASHEVSKY V. Lattice signatures without trapdoors [C]//Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin:Springer-Verlag, 2012:738-755.
[5] DUCAS L, DURMUS A, LEPOINT T, et al. Lattice signatures and bimodal Gaussians[C]//Crypto 2013. Berlin:Springer-Verlag, 2013:40-56.
[6] GENTRY C,SAHAI A, WATERS B. Homomorphic encryption form learning with errors:conceptually-simpler, asymptotically-faster, attributed-based [C]//Crypt 2013. Berlin:Springer-Verlag, 2013:75-92.
[7] BOYEN X. Attributed-based functional encryption on lattice[C]//TCC 2013. Berlin:Springer-Verlag, 2013:122-142.
[8] 王凤和, 胡予濮, 刘振华. 格基不经意传输协议[J]. 通信学报,2011,32(3):125-130.
WANG Fenghe, HU Yupu, LIU Zhenhua. Lattice-based obvious transfer protocol[J]. Journal of Communications, 2011, 32(3):125-130.
[9] LI Fagen, FAHAD T, BIN Muhaya, et al. Lattice-based signcryption[J]. Concurrency and Computation:Practice and Experience, 2012, 25(14):2112-2122.
[10] KREHBIEL S. Threshold lattice cryptography [EB/OL].[2013-12-10]. http:// www.cc.gatech.edu/computing/arc/fellowships/Fall%202011/research_pr-oposal_sara_krehbiel%20(3).pdf.
[11] AJTAI M. Generating hard instances of the short basis problem[C]//ICALP 1999. Berlin:Springer-Verlag,1999:1-9.
[12] GENTRY G, PERKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC 2008). New York:ACM Press, 2008:197-206.
[13] MICCIANCIO D, PEIKERT C. Trapdoor for lattice:simpler, tighter, faster, smaller [C]// EuroCrypt 2012. Berlin:Springer-Verlag, 2012:700-718.
[14] BENDLIN R, KREHBIET S, PEIKERT C. How to share a lattice trapdoor:threshold protocol for signatures and (H)IBE[C]//ACNS 2013. Berlin:Springer-Verlag, 2013:218-236.
[15] DESMEDT Y. Threshold cryptography[J]. European Transactions on Telecommunications, 1994, 5(4):449-457.
[16] GOLDREICH O, MICALI S, WIGDERSON A. How to play any mental game or a completeness theorem for protocols with honest majority[C]//STOC 1987. New York:ACM Press, 1987:218-229.
[1] 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84.
[2] 章广志,蔡绍斌,马春华,张东秋. 最大距离可分码在网络编码纠错中的应用[J]. 山东大学学报(理学版), 2018, 53(1): 75-82.
[3] 李阳,程雄,童言,陈伟,秦涛,张剑,徐明迪. 基于流量统计特征的潜在威胁用户挖掘方法[J]. 山东大学学报(理学版), 2018, 53(1): 83-88.
[4] 赵光远,秦丰林,郭晓东. 基于P2P的网络测量云平台的设计与实现[J]. 山东大学学报(理学版), 2017, 52(12): 104-110.
[5] 黄淑芹,徐勇,王平水. 基于概率矩阵分解的用户相似度计算方法及推荐应用[J]. 山东大学学报(理学版), 2017, 52(11): 37-43.
[6] 王亚奇,王静. 考虑好奇心理机制的动态复杂网络谣言传播研究[J]. 山东大学学报(理学版), 2017, 52(6): 99-104.
[7] 陈广瑞,陈兴蜀,王毅桐,葛龙. 一种IaaS多租户环境下虚拟机软件更新服务机制[J]. 山东大学学报(理学版), 2017, 52(3): 60-67.
[8] 庄政茂,陈兴蜀,邵国林,叶晓鸣. 一种时间相关性的异常流量检测模型[J]. 山东大学学报(理学版), 2017, 52(3): 68-73.
[9] 宋元章,李洪雨,陈媛,王俊杰. 基于分形与自适应数据融合的P2P botnet检测方法[J]. 山东大学学报(理学版), 2017, 52(3): 74-81.
[10] 祝升,周斌,朱湘. 综合用户相似性与话题时效性的影响力用户发现算法[J]. 山东大学学报(理学版), 2016, 51(9): 113-120.
[11] 岳猛,吴志军,姜军. 云计算中基于可用带宽欧氏距离的LDoS攻击检测方法[J]. 山东大学学报(理学版), 2016, 51(9): 92-100.
[12] 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91.
[13] 苏彬庭,许力,方禾,王峰. 基于Diffie-Hellman的无线Mesh网络快速认证机制[J]. 山东大学学报(理学版), 2016, 51(9): 101-105.
[14] 林丽. 基于核心依存图的新闻事件抽取[J]. 山东大学学报(理学版), 2016, 51(9): 121-126.
[15] 高盛祥,余正涛,秦雨,程韵如,庙介璞. 基于随机游走策略的专家关系网络构建[J]. 山东大学学报(理学版), 2016, 51(7): 30-34.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!