助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   oblivious transfer 的翻译结果: 查询用时:0.163秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
计算机软件及计算机应用
自动化技术
更多类别查询

图标索引 历史查询
 

oblivious transfer
相关语句
  不经意传输
     A 1-out-n Oblivious Transfer(OT)Protocol Based on Threshold Idea
     基于门限思想1-out-n不经意传输协议
短句来源
     RSA-based enhanced oblivious transfer protocol
     基于RSA数字签名的增强不经意传输协议
短句来源
     Oblivious Transfer Protocol with RSA-Based Access Control
     带有基于RSA签名的接入控制的不经意传输协议
短句来源
     A Protocol for Signing Contracts Based on Oblivious Transfer
     基于不经意传输的合同签订协议
短句来源
     A Private Transaction Mechanism of Digital Productions Based on Oblivious Transfer
     基于不经意传输的数字产品交易机制
短句来源
更多       
  “oblivious transfer”译为未确定词的双语例句
     Research of Oblivious Transfer Protocol
     对OT协议的分析与改进
     The Security Analysis for Y-Smooth Projective Hashing Oblivious Transfer Protocols
     Y-SPH-OT协议的安全性分析
     This paper summarized the current research status of multiparty computation protocols, introduced the four types of multiparty computation protocols and analyzed them. The four types of multiparty computation protocols are: multiparty computation protocol based on OT (Oblivious Transfer), multiparty computation protocol based on VSS (Verifiable Secret Sharing), multiparty computation protocol based on threshold homomorphic encryption and multiparty computation protocol based on Mix-Match.
     本文总结了目前安全多方计算协议的研究现状,介绍并分析了已有的四类安全多方计算协议:“基于OT 的安全多方计算协议”、“基于VSS 的安全多方计算协议”、“基于同态门限加密的安全多方计算协议”以及“基于Mix-Match 的安全多方计算协议”。
短句来源
     1. A secure multi-party multiplication protocol using the techniques of signcryption and oblivious transfer has been proposed and analyzed.
     1.将签密技术和不经意传递技术结合起来提出了一个基于签密的安全多方乘积协议,并对其进行了分析。
短句来源
     This paper investigates oblivious transfer protocol based on privacy amplification that uses Rényi entropy of order α for any 1<α<2 , and the conditions under which the protocol is secure are given.
     讨论了基于阶大于 1、小于 2的任意阶R啨nyi熵的盋茉銮吭谑迪植痪獯湫槭钡陌踩蕴跫? .
短句来源
更多       
  相似匹配句对
     Independent Oblivious Transfer
     独立的不经意传输(英文)
短句来源
     Oblivious transfer with extractors
     提取器在不经意传输协议中的应用
短句来源
     EECHNOLOGY TRANSFER
     山东省高新技术转移中心项目推荐
短句来源
     On Pragmatic Transfer
     语用迁移性之探讨
短句来源
查询“oblivious transfer”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  oblivious transfer
We resolve this apparent paradox by stressing the difference between non-local correlations and oblivious transfer, based on the time-ordering of their inputs and outputs, which prevents bit-commitment.
      
We show here that the recent work of Wolf and Wullschleger (quant-ph/0502030) on oblivious transfer apparently opens the possibility that non-local correlations which are stronger than those in quantum mechanics could be used for bit-commitment.
      
The Physics of No-Bit-Commitment: Generalized Quantum Non-Locality Versus Oblivious Transfer
      
In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers.
      
In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent's privacy and the hosts' privacy.
      
更多          


This paper investigates oblivious transfer protocol based on privacy amplification that uses Rényi entropy of order α for any 1<α<2 , and the conditions under which the protocol is secure are given. The protocol makes no assumptions about receiver's computing power, so under the given conditions the protocol is unconditionally-secure.

讨论了基于阶大于 1、小于 2的任意阶R啨nyi熵的盋茉銮吭谑迪植痪獯湫槭钡陌踩蕴跫?.协议中未对接收方的计算能力做任何限制性假设 ,因而在所给的安全性条件下 ,协议是无条件安全的 .

Reductions among oblivious transfers have a long history in cryptography. This paper describes a 21-OT~k protocol that can be reduced to a single execution of UOT by using privacy amplification with extractors. An extractor allows to efficiently isolate the randomness of some source into virtually-random bits, using a small number of perfectly-random bits as a catalyst. With extractors, less information is transmitted and the leaked information is at most 2~(-n~(-1/2-o(1))) bits. The conditions under which...

Reductions among oblivious transfers have a long history in cryptography. This paper describes a 21-OT~k protocol that can be reduced to a single execution of UOT by using privacy amplification with extractors. An extractor allows to efficiently isolate the randomness of some source into virtually-random bits, using a small number of perfectly-random bits as a catalyst. With extractors, less information is transmitted and the leaked information is at most 2~(-n~(-1/2-o(1))) bits. The conditions under which the protocol is unconditionally secure are investigated.

不经意传输协议之间的关系及相互转化是无条件安全密码学的研究重点之一.基于保密增强技术,提出了简化21 OTk为UOT单次执行的协议.采用提取器作为保密增强方法,利用少量附加完全随机性比特,获得几乎均匀分布的输出,泄露的信息量至多为2-n-1/2-o(1)比特,只与传送字串长度有关,而与选择的安全参数无关.与利用universalhash函数做为保密增强方法相比,所需传送的信息量和泄露的信息量更少.给出并证明了协议为无条件安全的条件.

A mobile agent protection scheme based on the non-interactive secure function evaluation was presented using an optimized oblivious transfer (OT) protocol. Most overheads of an OT protocol are modular exponentiations, which are computationally intensive tasks. The expansion from 1-out-of-2 OT protocol to 1-out-of-N OT protocol and the combination of N 1-out-of-2 OT protocol to one 1-out-of-N OT protocol defined a new simultaneous 1-out-of-N OT protocol, where the number of modular exponentiation was consequently...

A mobile agent protection scheme based on the non-interactive secure function evaluation was presented using an optimized oblivious transfer (OT) protocol. Most overheads of an OT protocol are modular exponentiations, which are computationally intensive tasks. The expansion from 1-out-of-2 OT protocol to 1-out-of-N OT protocol and the combination of N 1-out-of-2 OT protocol to one 1-out-of-N OT protocol defined a new simultaneous 1-out-of-N OT protocol, where the number of modular exponentiation was consequently reduced to a small constant. The simultaneous OT protocol and the encrypted circuit construction were combined to obtain a non-interactive secure function evaluation protocol. Source host proceeded as Alice, and multiple hosts proceeded as Bob. Each host contributed the part of encrypted circuit that represented its function, thus the resulting encrypted circuit became a cascade of sub-circuits. It is proved that the new scheme has lower overhead and more security, and is easier to implement than other similar systems.

通过优化不经意传输(OT)协议,提出一种基于非交互保密函数计算的移动代理保护新方案.根据OT协议的计算开销主要集中在密集的取幂运算,将OT协议由二选一扩展为多选一,把OT调用由多个二选一合并成单个多选一,在此基础上定义新的并发OT协议,使取幂运算次数减少为常数次.将该并发OT协议与加密电路构造组合,得到一个非交互保密函数计算协议.所有主机贡献出加密电路当中代表自己函数的部分,各个子电路进行级联,从而构造出最终的加密电路.与同类方案相比,新方案具有计算开销低、安全性更强、系统更容易实现等特点.

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关oblivious transfer的内容
在知识搜索中查有关oblivious transfer的内容
在数字搜索中查有关oblivious transfer的内容
在概念知识元中查有关oblivious transfer的内容
在学术趋势中查有关oblivious transfer的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社