帮助 关于我们

返回检索结果

基于同态加密的高效多方保密计算
Efficient Secure Multiparty Computation Based on Homomorphic Encryption

查看参考文献29篇

李顺东 1   王道顺 2  
文摘 多方保密计算是信息社会隐私保护的核心技术,是国际密码学界的研究热点之一.本文首先提出了一种新的对保密数据进行编码的方案,接着利用这种新的编码方案和同态加密方案,构造了一个百万富翁问题新的解决方案,并证明了方案的安全性.新的方案更简洁、更具有普遍意义,能够对可定义全序关系的任意两个对象进行比较.最后用这个新的解决方案解决了另一个新的多方保密计算问题-两个整数的互素问题,证明了方案是安全的.
其他语种文摘 Secure multiparty computation is a key privacy-preserving technology in cyberspaces and a research focus in the international cryptographic community.We first present a new encoding scheme to encode private data.By using this encoding scheme together with homomorphic encryption scheme,we construct a new scheme for Yao′s millionaires′ problem and prove its privacy-preserving property.This new scheme is more concise,more general and can be applied to compare any two objects on which a total order can be defined.We finally utilize the new scheme to propose a solution to the coprime problem and prove the privacy-preserving properties of the solution.
来源 电子学报 ,2013,41(4):798-803 【核心库】
DOI 10.3969/j.issn.0372-2112.2013.04.029
关键词 密码学 ; 同态加密 ; 多方保密计算 ; 百万富翁问题 ; 互素问题
地址

1. 陕西师范大学计算机科学学院, 陕西, 西安, 710062  

2. 清华大学计算机科学与技术系, 北京, 100084

语种 中文
文献类型 研究性论文
ISSN 0372-2112
学科 电子技术、通信技术
基金 国家自然科学基金 ;  陕西省科技攻关项目
文献收藏号 CSCD:4819381

参考文献 共 29 共2页

1.  Yao A C. Protocols for secure computations. Proceedings of the 23th IEEE Symposium on Foundations of Computer Science,1982:160-164 CSCD被引 9    
2.  Goldwasser S. Multi-party computations:Past and present. Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing,1997:1-6 CSCD被引 25    
3.  Du W L. Privacy-preserving cooperative scientific computations. Proceedings of 14th IEEE Computer Security Foundations Workshop Lecture,2001:273-282 CSCD被引 2    
4.  Choi S G. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Lecture Notes in Computer Science 7178,2012:416-432 CSCD被引 4    
5.  Agrawal R. Privacy-preserving data mining. Proceedings of ACM International Conference on Management of Data and Symposium on Principles of Database Systems,2000:439-450 CSCD被引 2    
6.  杨高明. 聚类的(α,k)-匿名数据发布. 电子学报,2011,39(8):1941-1946 CSCD被引 11    
7.  Toft T. Secure data structures based on multi-party computation. Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing,2011:291-292 CSCD被引 1    
8.  Loftus J. Secure outsourced computation. Lecture Notes in Computer Science 6737,2010:1-20 CSCD被引 3    
9.  Goldreich O. How to play any mental game. Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing,1987:218-229 CSCD被引 9    
10.  Goldreich O. The Fundamental of Cryptography:Basic Applications,2004 CSCD被引 8    
11.  Yao A C. How to generate and exchange secrets. Proceedings of 27th Annual Symposium on Foundations of Computer Science,1986:162-167 CSCD被引 2    
12.  Ioannidis I. An efficient protocol for yao's millionaires' problem. Proceedings of the 36th Hawaii International Conference on System Science,2003:1-6 CSCD被引 2    
13.  Clifton C. Security and privacy implications of data mining. Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery,1996:15-19 CSCD被引 1    
14.  王波. 一种基于逆聚类的个性化隐私匿名方法. 电子学报,2012,40(5):883-890 CSCD被引 18    
15.  Fagin R. Comparing information without leaking it. Communications of the ACM,1996,39(5):77-85 CSCD被引 24    
16.  刘文. 安全多方信息比较相等协议及其应用. 电子学报,2012,40(5):871-876 CSCD被引 15    
17.  Du W L. Protocols for secure remote database access with approximate matching. Advance of E-Commerce and Privacy,2001:87111 CSCD被引 1    
18.  Cachin C. Efficient private bidding and auctions with an oblivious third party. Proceedings of the 6th ACM Conference on Computer and Communications Security,1999:120-127 CSCD被引 14    
19.  Atallah M J. Secure multi-party computational geometry. Lecture Notes in Computer Science 2125,2001:165-179 CSCD被引 17    
20.  Li S D. Secure Two-Party Computational Geometry. Journal of Computer Science and Technology,2005,20(2):258-263 CSCD被引 20    
引证文献 32

1 王怀军 白盒环境中防动态攻击的软件保护方法研究 电子学报,2014,42(3):529-537
CSCD被引 5

2 刘泓晖 面向两层WSNs的高效随机调制隐私保护最值查询协议 计算机科学,2014,41(12):95-100,128
CSCD被引 1

显示所有32篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号