期刊文献+

信息论安全的3个基础外包计算协议及空间位置关系保密判定

Three basic information-theoretic secure protocols for outsourcing computing and privacy-preserving determination of spatial location-relation
下载PDF
导出
摘要 现存的安全几何计算协议大多采用公钥加密方法保护数据隐私,计算成本较大。当计算能力不强的用户解决复杂问题时,效率往往较低。针对这些问题,避开公钥加密的方法,而是利用矩阵论中一些特殊函数的性质和随机数混淆的方法来保护数据隐私,并且为了进一步提高效率,将大量的用户计算外包出去。在此基础上,首先设计了常用的3个基础向量外包计算协议,分别是安全外包计算的向量模长计算协议,向量内积计算协议和向量夹角计算协议,并利用模拟范例证明了协议的安全性,然后利用这3个基础协议进一步解决了现实意义中如何保密判断空间面与面位置关系的问题,并给出了具体协议。最后,通过理论分析与实验仿真显示:由于协议没有使用公钥加密的方法,因此达到了信息论安全;并且由于外包计算的使用,为用户节省了更多的计算成本,取得了比较高的效率;此外,协议能够解决的问题也更加广泛,可作为新的云计算技术的基础协议应用到安全多方计算的其它分支中。 The existing protocols for secure geometric computation mainly make use of the public key encryption to protect the privacy of data,which is more costly.And there arises a problem of inefficiency for the users weak in computing power solve complicated problems.Aiming at these drawbacks,this paper combines the properties of some special functions in matrix theory with the random number to protect the data’s privacy instead of the public key encryption.In the meanwhile,numerous computation tasks are also outsourced in order to further improve the performance.On the basis of these techniques,we first design three basic protocols for vector calculation,including security outsourcing calculation of vector length,vector inner product,and vector angle with the security of our protocols proved with simulation paradigm.Then we employ them to privately determine the spatial location-relation of plane and the plane in the sense of real life.Finally,the analysis and comparison under theory and simulation experiments shows that our protocols achieve the information-theoretic security and a higher efficiency because of using the outsourcing computing rather than the public key encryption,as well as they can be applicable to solve more problems than the previous ones.The proposed protocols in this paper as the new techniques of cloud computing can be used in building-blocks in secure multi-party computation.
作者 陈振华 黄路琪 史晓楠 聂靖靖 CHEN Zhen-hua;HUANG Lu-qi;SHI Xiao-nan;NIE Jing-jing(College of Computer Science and Technology,Xi’an University of Science and Technology,Xi’an 710054,China;Guangxi Key Laboratory of Cryptography and Information Security,Guilin University of Electronic Technology,Guilin 541004,China)
出处 《西安科技大学学报》 CAS 北大核心 2019年第6期1049-1056,共8页 Journal of Xi’an University of Science and Technology
基金 国家自然科学基金(61872289) 广西密码学与信息安全重点实验室开放课题(GCIS201714).
关键词 安全多方计算 外包计算 内积协议 空间位置 信息论安全 secure multi-party computation outsourcing computing inner product protocol spatial location information-theoretic security
  • 相关文献

参考文献4

二级参考文献24

  • 1罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 2C C Aggarwal,P S Yu. A General Survey of Privacy-preserv-ing Data Mining Models and Algorithms[M].NewYork:Springer US,2008.11-52.
  • 3L Sweeney. K-anonymity:A model for protecting privacy[J].International Journal of Uncertainty Fuzziness and Knowledge-Based Systems,2002,(05):557-570.
  • 4S Lee,M G Genton,R B Arellano-Valle. Perturbation of nu-merical confidential data via skew-t distributions[J].Manage-ment Science,2010,(02):318-333.
  • 5K K Chen,L Liu. Geometric data perturbation for privacy pre-serving outsourced data mining[J].Knowledge and Information Systems,2011,(03):657-695.
  • 6C C Aggarwal. On randomization,public information and the curse of dimensionality[A].Istanbul:IEEE,2007.136-145.
  • 7K Liu,H Kargupta,J Ryan. Random projection-based multi-plicative data perturbation for privacy preserving distributed data mining[J].IEEE Transactions on Knowledge and Data Engineering,2006,(01):92-106.doi:10.1109/TKDE.2006.14.
  • 8C C Aggarwal,P S Yu. On privacy-preservation of text and sparse binary data with sketches[A].Minnesota:SIAM,2007.57-67.
  • 9Y Sang,H Shen,H Tian. Reconstructing data perturbed by random projections when the mixing matrix is known[A].Beilin:Springer-Verlag,2009.334-349.
  • 10W B Johnson,J Lindenstrauss. Extensions of lipschitz map-pings into a hilbert space[J].Contemporary Mathematics,1984.189-206.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部