Page 292 - 《软件学报》2020年第12期
P. 292
3958 Journal of Software 软件学报 Vol.31, No.12, December 2020
• 密文 (cc′ , ′ ) 是 Alice 经过下述方式构造的.
i L i R
(1) 由密文 CC ,利用方案E计算:
,
2 b′
1 b′
a
′
2
n
C = ((C ) 1 a k ⋅ L 2 mod ) (1+ n 2 × kkn )r n mod ,
a
( L 1 ) ′ ⋅b ′ + 1 a k b 1 ′ 1 a 1 a 1 a
2
′
C (a ⋅b ′ + = ((C b ) 1 a k ⋅a 1 L mod ) (1+ n 2 × kkn )r n mod n 2 ,
1 2 ) ′ L 1 a k 2 ′ 1 a 1 a 2 a
a
C = ((C ) a k 2 ⋅ R 2 mod ) (1+ n 2 × k ′ k ) n r n mod n 2 ,
a
( R 1 ) ′ ⋅b ′ + a k b 1 ′ 2 a 2 a 3 a
2 2
C (a 1 R ⋅ 2 )+ ′ b ′ 2 = ((C b 2 ′ a k ) a k 2 ⋅a 1 R mod ) (1+ n 2 × k 2 a ′ k 2 a ) n r n 2 a mod n 2 ;
(2) 随机选取一个:
, ′
∈
(( ′ cc 1 R ),( ′ c 2 L , ′ c R 2 )) {((C ( L 2 1 ) ′ ⋅ ′ + 1 a ,C (a 1 L b 2 ) ′ ⋅b ′ +k 1 a ),(C ( R 2 1 ) ′ ⋅ k ′ + 2 ,C (a 1 R b 2 ) ′ ⋅ b a k ′ + a k 2 )),
a
1 L
a
((C (a ⋅ ′ + ,C (a ′ ⋅b ),(C (a ⋅ + + ′ ,C ( R b ⋅ +k ′ a )),
1 2 ) ′ L 1 a k 2 1 ) ′ L b 1 a 1 2 ) ′ R b 2 2 1 ) ′ a k a k 2
((C ′ + ,C ′ ),(C ′ ,C ′ )),
a
a
a
( R 2 1 ) ′ ⋅ 2 ( R b 2 ) ′ ⋅b 2 ( L b ⋅+ a k 1 ) ′ a k 1 a k (a 1 L b ⋅ 2 ) ′+ + 1 a k
2
1
((C (a ⋅b ′ + ,C (a + ′ ⋅ a k ),(C (a ⋅b ′ + ,C ′ + )),
1 2 ) ′ R 2 2 1 ) ′ R b a k 2 1 2 ) ′ L 1 a k (a L 2 1 ) ′ ⋅b 1 a k
((C ′ + ,C ),(C ,C ′ + )),
a
a
a
( R 2 1 ) ′ ⋅ 2 ( R b 2 ) ′ ⋅b ′ + a k 2 ( L 2 1 ) ′ ⋅ k ′ + a 1 a k (a 1 L b 2 ) ′ ⋅ b 1 a k
1
((C ,C ),(C ,C )),
a
a
( L 1 ) ′ ⋅ ′ + 1 a k (a 1 L b 2 ) ′ ⋅b ′ + 1 a k ( R b 1 )+ ′ ⋅ ′ ( R ⋅b 2 ) ′ a k + a k ′ a
2 2 2 1 2
((C (a ⋅ ′ + ,C (a ⋅b ′ + a k ),(C (a ⋅ ′ + a k ,C (a ⋅b ′ + )),
1 2 ) ′ R 2 2 1 ) ′ R b 2 1 2 ) ′ L 1 a k 2 1 ) ′ L b 1 a k
((C ,C ),(C ,C ))}.
(a 1 ⋅ 2 ) ′ L ′ +b 1 a k (a 2 1 ) ′ L k a ′ +⋅b 1 (a 1 ⋅ 2 ) ′ R ′ + 2 (a 2 ⋅b 1 ) ′ R b a k ′ + a k 2
,
而 Alice 在协议Π 1 的实际执行中生成的实际视图为 (CC 2 b ( , c 1 L ,c 1 R ),(c 2 L ,c R 2 ) ) ,其中, CC 是 Bob 利用自
,
1 b
1 b
2 b
2
2 b
己的公钥通过计算 C = (1 n r+ ) b 1 n mod n 2 ,C = (1 n+ ) r n mod n 得到的,密文 (cc ) 是 Alice 经过下述方式
,
1 b 1 b 2 b 2 b i L i R
构造的.
(1) 由密文 CC 利用方案E同态性计算得到:
,
1 b 2 b
a
′
C ′ = ((C ) 1 a k ⋅ L 2 mod ) (1+ n 2 × kkn )r n mod n 2 ,
a
( L ⋅b 1 )+ a k 1 b 1 a 1 a 1 a
2 1
′
C (a 1 L ⋅b 2 )+ a k ′ = 1 ((C 2 b ) 1 a k ⋅a 1 L mod ) (1+ n 2 × kkn )r n 2 a mod n 2 ,
1 a
1 a
a
C = ((C ) a k 2 ⋅ R 2 mod ) (1+ n 2 × k ′ k ) n r n mod n 2 ,
a
( R ⋅b 1 )+ a k ′ 1 b 2 a 2 a 3 a
2 2
×
C = ((C ) a k 2 ⋅a 1 R mod n 2 ) (1+ k ′ k ) n r n mod n 2 ;
( R ⋅a 2 )+b ′ a k 2 b 2 a 2 a 2 a
1 2
(2) 随机选择一个:
,
((cc 1 R ),(c 2 L ,c R 2 )) {((∈ ( L 2 ⋅ 1 )+ ′ C 1 ,C (a 1 L b ⋅b 2 )+ a k ′ 1 ),(C ( R b ⋅ 1 )+ a k ′ 2 ,C (a 1 R b ⋅ 2 )+ a k ′ a k 2 )),
a
1 L
a
2
((C (a ⋅ ′ ,C ( L b ⋅b ′ ),(C a ⋅ ′ ,C ( R b ⋅b )),
a
a
1 L 2 )+ 1 2 1 )+ a k 1 ( R 1 2 )+ a k 2 2 1 )+ k a k ′ a 2
((C ′ ,C ′ ),(C ′ ,C ′ )),
a
a
a
( R 2 ⋅ 1 )+ 2 ( R b ⋅b 2 )+ a k 2 ( L b ⋅ 1 )+ a k 1 (a 1 L b ⋅ 2 )+ a k 1 a k
1
2
((C (a ⋅ ′ ,C ( R b ⋅b ′ ),(C (a ⋅ ′ ,C ( L a ⋅b ′ )),
a
1 R 2 )+ 2 2 1 )+ a k 2 1 L b 2 )+ a k 1 2 1 )+ a k 1 a k
((C ,C ),(C ,C )),
a
a
a
( R ⋅ 1 )+ ′ ( R b ⋅b 2 )+ a k ′ ( L b ⋅ 1 )+ a k ′ (a 1 L b ⋅ 2 )+ a k ′ 1 a k
2 2 1 2 2 1
((C ,C ),(C ,C )),
a
a
a
⋅b
( L ⋅ 1 )+ a k ′ (a 1 L b 2 )+ ′ ( R b ⋅ 1 )+ a ′ ( R b ⋅k 2 )+ a k ′ a k
2 1 1 2 2 1 2
((C (a ⋅ ′ ,C ( R b ⋅b ′ ),(C (a ⋅ ′ ,C ( L a ⋅ b ′ )),
a
1 R 2 )+ 2 2 1 )+ a k 2 1 L b 2 )+ a k 1 2 1 )+ a k 1 a k
((C ,C ),(C ,C ))}.
a
(a 1 L ⋅ 2 )+ ′ 1 ( L b ⋅b 1 )+ a k ′ 1 (a 1 R b ⋅ 2 )+ a k ′ 2 ( R b ⋅ 1 )+ a k ′ a k 2
a
2
2
, ′
,
敌手 S 2 Π 1 (或者 Bob)获得 (cc′ i R ) 与 (cc i R ) 后,通过解密运算后,最多只能得到由 4 个方程(其中,每个方程
i L
i L
各包含 3 个不同的未知数)组成的方程组,不可能通过联立方程组计算出具体的 a 1 L ,a 2 L ,a 1 R ,a .即 S 2 Π 1 满足安全
R
2
定义关系式(1b).
综上,在半诚实模型下,用于保密判定某一有理数是否属于一个上、下界为有理数区间的协议是安全的. □