Font Size: a A A

Multi-party Cryptographic Protocol Design Based On Micali-Rabin Random Vector Representation

Posted on:2021-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:H O YangFull Text:PDF
GTID:2428330611950424Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cryptographic protocol is a message exchange protocol based on modern cryptography theory,which purpose is to provide various security services in the network environment of computer communication network and distributed system.Secret sharing is the basic cryptographic protocol that constructs various cryptographic schemes and is an important means in information security and data confidentiality.The existing threshold secret sharing scheme seriously restricts the practical application scenarios of secret sharing due to the assumption that members have completely equal status and rights.Therefore,it is very important to study the more universal general secret sharing scheme.Secondly,with the development of Internet technology and the explosion of data,the traditional single-server outsourcing computing mode needs to be extended to multi-server outsourcing computing mode in both theoretical research and practical application.So,it is of great theoretical significance and practical value to study the multi-server outsourcing computation.In this paper,cryptography technology is used as a tool to study the design and security of multi-server cryptographic protocol.The research content involves verifiable secret sharing based on random vector representation technique and threshold outsourcing computation for modular exponentiation.The specific work is as follows:(1)Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique.Firstly,the Computational Diffie-Hellman problem basedon bilinear pairs is used to construct a secret sharing scheme for general access structures.Then Micali-Rabin random vector representation technique and knowledge commitment bilinear pair are introduced to construct an efficient verification process,which the process will not reveal any specific information about public information.Finally,the protocol is analyzed from two aspects of security and efficiency,and the performance in the actual scenario is verified by simulation experiments.(2)Threshold Outsourcing Computation For Modular Exponentiation.Firstly,based on the idea of Publicly Verifiable Secret Sharing(PVSS),a multi-server threshold outsourcing computing system model and its security model are constructed.Secondly,the privacy of sensitive information is guaranteed by means of encryption algorithm.Then,an efficient and safe interactive verification process is constructed by using the zero-knowledge proof technology,which ensuring the verifiability of computational results.Finally,security analysis and performance analysis show the effectiveness of the protocol.(3)Application research of multi-server cryptographic protocol based on random vector representation technique.Firstly,according to the first research content,a fair and verifiable electronic voting scheme is designed based on verifiable secret sharing,random vector representation technology and knowledge commitment scheme ensure the privacy and verifiability of voting information.Secondly,according to the second research content,based on the threshold outsourcing algorithm of modular exponentiation,the RSA encrypted secure outsourcing algorithm and the secure outsourcing El Gamal signature algorithm are constructed.According to the analysis of experimental results,it is shown that the client can effectively verify the returned results with only a small amount of computational work.
Keywords/Search Tags:General Access Structure, Random Vector Representation, Public Verifiable Secret Sharing, Multi-server, Threshold Outsourcing Computation
PDF Full Text Request
Related items