基于同态加密的高效多方保密计算
Efficient Secure Multiparty Computation Based on Homomorphic Encryption
查看参考文献29篇
文摘
|
多方保密计算是信息社会隐私保护的核心技术,是国际密码学界的研究热点之一.本文首先提出了一种新的对保密数据进行编码的方案,接着利用这种新的编码方案和同态加密方案,构造了一个百万富翁问题新的解决方案,并证明了方案的安全性.新的方案更简洁、更具有普遍意义,能够对可定义全序关系的任意两个对象进行比较.最后用这个新的解决方案解决了另一个新的多方保密计算问题-两个整数的互素问题,证明了方案是安全的. |
其他语种文摘
|
Secure multiparty computation is a key privacy-preserving technology in cyberspaces and a research focus in the international cryptographic community.We first present a new encoding scheme to encode private data.By using this encoding scheme together with homomorphic encryption scheme,we construct a new scheme for Yao′s millionaires′ problem and prove its privacy-preserving property.This new scheme is more concise,more general and can be applied to compare any two objects on which a total order can be defined.We finally utilize the new scheme to propose a solution to the coprime problem and prove the privacy-preserving properties of the solution. |
来源
|
电子学报
,2013,41(4):798-803 【核心库】
|
DOI
|
10.3969/j.issn.0372-2112.2013.04.029
|
关键词
|
密码学
;
同态加密
;
多方保密计算
;
百万富翁问题
;
互素问题
|
地址
|
1.
陕西师范大学计算机科学学院, 陕西, 西安, 710062
2.
清华大学计算机科学与技术系, 北京, 100084
|
语种
|
中文 |
文献类型
|
研究性论文 |
ISSN
|
0372-2112 |
学科
|
电子技术、通信技术 |
基金
|
国家自然科学基金
;
陕西省科技攻关项目
|
文献收藏号
|
CSCD:4819381
|
参考文献 共
29
共2页
|
1.
Yao A C. Protocols for secure computations.
Proceedings of the 23th IEEE Symposium on Foundations of Computer Science,1982:160-164
|
CSCD被引
9
次
|
|
|
|
2.
Goldwasser S. Multi-party computations:Past and present.
Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing,1997:1-6
|
CSCD被引
25
次
|
|
|
|
3.
Du W L. Privacy-preserving cooperative scientific computations.
Proceedings of 14th IEEE Computer Security Foundations Workshop Lecture,2001:273-282
|
CSCD被引
2
次
|
|
|
|
4.
Choi S G. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces.
Lecture Notes in Computer Science 7178,2012:416-432
|
CSCD被引
4
次
|
|
|
|
5.
Agrawal R. Privacy-preserving data mining.
Proceedings of ACM International Conference on Management of Data and Symposium on Principles of Database Systems,2000:439-450
|
CSCD被引
2
次
|
|
|
|
6.
杨高明. 聚类的(α,k)-匿名数据发布.
电子学报,2011,39(8):1941-1946
|
CSCD被引
11
次
|
|
|
|
7.
Toft T. Secure data structures based on multi-party computation.
Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing,2011:291-292
|
CSCD被引
1
次
|
|
|
|
8.
Loftus J. Secure outsourced computation.
Lecture Notes in Computer Science 6737,2010:1-20
|
CSCD被引
3
次
|
|
|
|
9.
Goldreich O. How to play any mental game.
Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing,1987:218-229
|
CSCD被引
9
次
|
|
|
|
10.
Goldreich O.
The Fundamental of Cryptography:Basic Applications,2004
|
CSCD被引
8
次
|
|
|
|
11.
Yao A C. How to generate and exchange secrets.
Proceedings of 27th Annual Symposium on Foundations of Computer Science,1986:162-167
|
CSCD被引
2
次
|
|
|
|
12.
Ioannidis I. An efficient protocol for yao's millionaires' problem.
Proceedings of the 36th Hawaii International Conference on System Science,2003:1-6
|
CSCD被引
2
次
|
|
|
|
13.
Clifton C. Security and privacy implications of data mining.
Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery,1996:15-19
|
CSCD被引
1
次
|
|
|
|
14.
王波. 一种基于逆聚类的个性化隐私匿名方法.
电子学报,2012,40(5):883-890
|
CSCD被引
18
次
|
|
|
|
15.
Fagin R. Comparing information without leaking it.
Communications of the ACM,1996,39(5):77-85
|
CSCD被引
24
次
|
|
|
|
16.
刘文. 安全多方信息比较相等协议及其应用.
电子学报,2012,40(5):871-876
|
CSCD被引
15
次
|
|
|
|
17.
Du W L. Protocols for secure remote database access with approximate matching.
Advance of E-Commerce and Privacy,2001:87111
|
CSCD被引
1
次
|
|
|
|
18.
Cachin C. Efficient private bidding and auctions with an oblivious third party.
Proceedings of the 6th ACM Conference on Computer and Communications Security,1999:120-127
|
CSCD被引
14
次
|
|
|
|
19.
Atallah M J. Secure multi-party computational geometry.
Lecture Notes in Computer Science 2125,2001:165-179
|
CSCD被引
17
次
|
|
|
|
20.
Li S D. Secure Two-Party Computational Geometry.
Journal of Computer Science and Technology,2005,20(2):258-263
|
CSCD被引
20
次
|
|
|
|
|