作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2013, Vol. 39 ›› Issue (2): 125-129. doi: 10.3969/j.issn.1000-3428.2013.02.025

• 安全技术 • 上一篇    下一篇

基于防篡改硬件模型的UC安全承诺协议

张 妤 1,阴建强 2,胡 杰 3   

  1. (1. 郑州信息科技学院三系,郑州 450004; 2. 郑州电子信息中等专业学校,郑州 450100;3. 装甲兵工程学院,北京 100072)
  • 收稿日期:2011-11-01 出版日期:2013-02-15 发布日期:2013-02-13
  • 作者简介:张 妤(1982-),女,博士研究生,主研方向:信息安全,密码学;阴建强,讲师;胡 杰,工程师
  • 基金资助:
    国家“863”计划基金资助项目(2007AA01Z405)

Universally Composable Secure Commitment Protocol Based on Tamper-proof Hardware Model

ZHANG Yu 1, YIN Jian-qiang 2, HU Jie 3   

  1. (1. The 3rd Department, Zhengzhou Institute of Information Science and Technology, Zhengzhou 450004, China; 2. Zhengzhou Electronic Information Specialized Secondary School, Zhengzhou 450100, China; 3. Academy of Armored Forces Engineering, Beijing 100072, China)
  • Received:2011-11-01 Online:2013-02-15 Published:2013-02-13

摘要: 从通用可组合(UC)框架的基本概念出发,分析UC安全性对承诺协议的要求,得出以下结论:朴素模型中不存在UC安全承诺协议是因为承诺协议的安全需求与UC安全性要求间存在矛盾。在此基础上提出一种基于防篡改硬件模型的UC安全承诺协议UCCOM。分析结果表明,UCCOM的安全性不依赖于可信第三方,与同类协议相比,使用的密码学操作更少,效率更高。

关键词: 承诺协议, 通用可组合安全性, 防篡改硬件, 隐藏性, 绑定性

Abstract: Beginning with the research of the basic concepts of Universally Composable(UC) framework, the requirement of UC security on commitment protocols is analyzed in this paper, and the reason of the problem that all UC commitment protocols do not exist in the plain model is pointed out that the security requirement of commitment protocol and the requirement of UC security are contradictory. On the basis of this, a UC secure commitment protocol UCCOM using tamper-proof hardware is proposed. Analysis result shows that UCCOM does not depend on any trusted third-party and uses fewer cryptographic operations compared with the related works, so it has higer efficiency.

Key words: commitment protocol, Universally Composable(UC) security, tamper-proof hardware, hiding property, binding property

中图分类号: