跳到主要內容

臺灣博碩士論文加值系統

(2600:1f28:365:80b0:1fb:e713:2b67:6e79) 您好!臺灣時間:2024/12/12 15:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:周仁厚
研究生(外文):Jen-Hou Chou
論文名稱:隱密式資料庫搜尋之安全性與完整性之探討
論文名稱(外文):On th Possibility of Basing Oblivious Transfer on Weakened Private Information Retrieval
指導教授:呂育道呂育道引用關係
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:21
中文關鍵詞:隱密式資料庫搜尋
外文關鍵詞:Private Information RetrievalOblivious TransferPIROT
相關次數:
  • 被引用被引用:0
  • 點閱點閱:197
  • 評分評分:
  • 下載下載:20
  • 收藏至我的研究室書目清單書目收藏:1
如何以較弱的密碼學的假設達到安全的通訊一直是密碼學上的重要課題。
本篇論文嘗試以隱密式資料庫搜尋來建構一個安全的密碼學協定,並且把
隱密式資料庫搜尋所定義的安全性降低,討論其是否能夠建構一個完整的
密碼學協定。

We consider the problem of reducing Oblivious Transfer to Private Information Retrieval. We give a simple reduction from 1-out-of-2 Oblivious Transfer to Private Information Retrieval, where the reduction is against malicious players.
We also consider the completeness of Private Information Retrieval on weakened assumption. We will give a impossibility result and a possibility result.

{1}Introduction}{1}
{2}Preliminaries}{4}
{3}Malicious PIR implies OT}{9}
{4}The Completeness of Weak PIR}{12}
{4.1}Definition}{12}
{4.2}Impossibility Results}{12}
{4.3}Reducing Weak OT to Weak PIR}{13}
{Bibliography}{16}

A. Ambainis, "Upper Bound on the Communication Complexity of
Private Information Retrieval", In Proc. of 24th ICALP, 1997.
Y. Aumann, Y. Z. Ding, and M. O. Rabin, "Everlasting Security in
the Bounded Storage Model".
A. Beimel, T. Malkin and S. Micali, "The All-or-Nothing Nature of Two-Party Secure Computation", In Proc. of Crypto 99, 1999.
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer,
"Generalized Privacy Amplification", IEEE Transactions of
Information Theory, 41(6), 1995.
G. Brassard, C. Crepeau and J. M. Robert, "All-or-Nothing
Disclosure of Secrets", In Crypto'86, 1987, pp. 234-238.
G. Brassard and C. Crepeau, "Oblivious Transfer and Privacy
Amplification", EUROCRYPT'97, LNCS series, vol. 1223, pp. 334-347. C. Cachin, "On the foundations of Oblivious Transfer",
EUROCRYPT'98, LNCS series, vol.1403, pp. 361-374.
G. Brassard, C. Crepeau, and M. Santha. "Oblivious Transfer and
Intersecting Codes". IEEE Trans. Info. Theory, vol. 42, No. 6, pp.
1769-1780. 1996.
C. Cachin, "On the Foundations of Oblivious Transfer",
EUROCRYPT'98, LNCS series, vol. 1403, pp. 361-374.
C. Cachin, C. Crepeau, and S. Marcil,"Onlivious Transfer with a
Momory Bounded Receiver", In Proc. of 39th FOCS, 1998.
C. Cachin and U. Maurer, "Unconditional Security Against Memory
Bounded Adversaries", In Advances in Cryptology - Crypto'97, 1997.
B. Chor, abd N. Gilboa, "Computationally Private Information
Retrieval", In Proc. of 29th STOC, 1997.
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private
Information Retrieval", FOCS 1995, pp. 41-50.
C. Crepeau, "Equivalence Between Two Flavours of Oblivious
Transfer", CRYPTO'87, LNCS series, pp. 350-354.
C. Crepeau, "Efficient Cryptographic Protocols based on Noisy
Channels", Eurocrypt'97, LNCS series, vol. 1233, pp. 306-317.
C. Crepeau and J. Kilian, "Achieving Oblivious Transfer using
Weakened Security Assumptions", FOCS 88, pp. 42-52.
G. D. Crescenzo, T. Malkin, and R. Ostrovsky, "Single Database
Private Information Implies Oblivious Transfer", EUROCRYPT 2000,
LNCS 1807, pp. 122-138.
I. Damg\aa rd, J. Kilian, and L. Salvail, "On the (Im) possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions". EUROCRYPT'99, LNCS 1592, pp.56-73.
A. De-Santis and P. Persiano, "Zero-Knowledge Proofs of Knowledge without Interaction", In Proc. of 33rd FOCS, 1992.
Y. Z. Ding, "Oblivious Transfer in the Bounded Storage Model",
Crypto 2001, pp. 155-170.
S. Even, O. Goldreich, and A. Lempel, "A randomized Protocol for
signing contracts", Communications of the ACM, Vol. 28, No. 6,
1985, pp. 637-647.
U. Feige and A. Shamir, "Witness Indistinguishable and Witness
Hiding Protocols", In Proc. of 23rd STOC, 1990.
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game", Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, 1987, pp. 218-229.
O. Goldreich, S. Micali, and A. Wigderson, "Proofs that Yield
Nothing but their Validiaty, and a Methodology of Cryptographic
Protocol Design", In Journal of the ACM, vol. 38, 1991, pp.
691-729.
J. Halpern and M.O. Rabin, "A Logic to Reason about likehood",
Proceedings of the 15th Annual ACM Symposium on the Theory of
Computing, 1983, pp. 310-319.
J. Kilian, "A general completeness theorem for 2-party games",
Proceedings of the 23rd Annual ACM Symposium on the Theory of
Computing, 1991, pp. 553-560.
J. Kilian, "Founding Cryptography on Oblivious Transfer", STOC
1988, pp. 20-31.
U. Maurer and S. Wolf, "Privacy Amplification Secure Against
Active Adversaries", In Advances in Cryptology - Crypto'97, 1997.
M. Naor, "Bit Commitment Using Pseudorandom Generators", Journal
of cryptology 1991, pp. 151-158.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林玉華,民意的定義與民意政治的發展。台北:行政學報第二十三期,台北:中興大學公共行政學系,1991年6月。
2. 林火旺,公民意識與社會正義。台北:哲學雜誌第期,1993年4月。
3. 李建良,行政程序行為與救濟。月旦法學雜誌第49期,台北:元照出版有限公司,1999年6月。
4. 吳統雄,民意調查與選舉新聞從公眾新聞與精確新聞角度的探討。新聞鏡周刊第394期,台北:新聞鏡周刊社,1996年5月。
5. 吳明儒,公共利益本質與社會福利議題──兼論社區問題與公共利益。台北:社區發展季刊第75期,1996年9月。
6. 余致力,民意與公共政策:表達方式的釐清與因果關係的探究。中國行政評論第九卷第四期,台北:中華民國公共行政學會,2000年9月。
7. 江岷欽,「企業型政府新詮」。理論與政策第十二卷第二期,台北:理論與政策,1998年。
8. 江丙坤,「公營事業民營化與全民優惠釋股」。理論與政策第十一卷第四期,台北:理論與政策,1997年。
9. 包國祥,我國「行政程序法」適用範圍之疑義──行政行為與行政程序之探討,律師雜誌第247期,台北:台北律師公會,1998年4月。
10. 余德慧、蔡怡佳(1995)。「離合」在青少年發展歷程的意義。本土心理學研究,3,93-140。
11. 余德慧(1996)。文化心理學的詮釋之道。本土心理學研究,6,146-202。
12. 林建欣,從「正當法律程序」論行政程序之制定。人事月刊第26卷第五期,台北:人事月刊雜誌社1998年5月。
13. 林俊益,程序優先於實體之原則。月旦法學雜誌第56期,台北:元照出版有限公司,2000年1月。
14. 林玉華,民意的定義與民意政治的發展。台北:行政學報第二十三期,1991年6月。
15. 洪宜和,行政程序法第三條第三項第四款排除行政程序適用初探(上),法務通訊第205期,台北:法務部,2000年1月。