期刊文献+

面向有差异群体的联合决策方案 被引量:1

A Joint Decision-Making Scheme for Groups with Members Having Different Superiorities
下载PDF
导出
摘要 公平性、透明性是联合决策的基本安全需求.结合多机构商务合作背景,利用具有同态性质的Paillier公钥密码系统和门限密码技术,提出了面向有差异群体的联合决策策略与方案,并对其安全性进行了分析和证明. The basic requirements of joint decision-making are fairness and transparency. In this paper, combined with commercial background, a joint decision-making policy and scheme for groups with members having different superiorities is proposed by using PaiUier public key eryptosystem with homeostasis quality based on threshold technique. The newly presented threshold scheme is also proved and examined.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第8期1523-1528,共6页 Acta Electronica Sinica
基金 国家973课题项目(No.G1999035802) 国家自然科学基金项目(No.60373039) 国家自然科学基金重大研究计划项目(No.90304007) 国家863课题项目(No.2004AA147070)
关键词 联合决策 元权限 Paillier公钥密码系统 门限密码系统 joint decision-making meta-permission paillier public-key cryptosystem threshold cryptosystem
  • 相关文献

参考文献14

  • 1Khurana H. Negotiation and management of coalition resources[D].USA: University of Maryland, 2002.
  • 2Khurana H, Gligor V, Linn J. Reasoning about joint administration of access policies for coalition resources[A].Amin Tjoa Eds.Proceedings of the International Conference for Distributed Computer Systems-ICDCS[C]. New York : IEEE Press, July 2002. 429 - 452.
  • 3Y Desmedt. Society and group oriented cryptography: a new concept[A]. C Pomerance Eds Advance in Cryptology- Crypto '87[C],Berlin: Springer-Verlag, 1988, Volume 293 of LNCS, 120 - 127.
  • 4Yvo Desmedt, Yair Frankel. Threshold Cryptosystesns [ A ]. G Brassard Eds. Advance in Cryptology? Crypto' 89 [ C]. Berlin : Sprithger-Verlag,1989,Volume 435 of LNCS,305 - 315.
  • 5T Wang. Cryptosystem for group oriented cryptography [ A ]. I B Damgard Eds. Advances in Cryptology-Eurocrypt' 90 [ C ]. Berlin:Springer-Verlag, 1990. Volume 473 of LNCS,352 - 360.
  • 6W P Ma, M H Lee. Group Oriented Cryptosystems Based on Linear Access Structures [ A ]. J I Lim, D H Lee Eds. Information Security and Cryptology-ICISC 2003 [ C ]. Berlin: Springer-Verlag, 2004. Volume 2971 of LNCS,370 - 376.
  • 7雷浩,冯登国,周永彬,黄建.基于量化权限的门限访问控制方案[J].软件学报,2004,15(11):1680-1688. 被引量:11
  • 8Paillier P. Public-Key cryptosystems based on composite degree residuosity classes[ A]. J Stern Eds. Eurocrypt'99[ C]. Berlin: Springer Verlag 1999. Volume 1592 of LNCS,223- 238.
  • 9Damgard I,Jurik M.A generalization,a Simplification and Some Applications of Paillier's Probabilistic Public-Key System[A]. K Kim Eds.PKC2001[C]. Berlin:Springer Verlag,2001, Volume 1992 of LNCS,119 - 136.
  • 10Damgard I,and Koprowski M. Practical threshold lISA signatures without a trusted dealer[ A]. B Pfitzmann FAs. Advances in Cayptology-Eurocrypt2001 [ C]. Berlin: Springer-Verlag,2001, Volume 2045 of LNCS,152- 165.

二级参考文献1

共引文献26

同被引文献28

  • 1VIRRANTAUS K, MARKKULA J, GARMASH A, et al. Developing GIS-supported location-based services[A]. WISE[C]. Kyoto, 2001.66-75.
  • 2GRUTESTER M, GRUNWALD D. Anonymous usage of loca- tion-based services through spatial and temporal cloaking[A]. Mobi- Sys[C]. USA, 2003.31-42.
  • 3SWEENEY L. k-anonymity: a model for protecting privacy[J]. Journal of Uncertainty Fuzziness and Knowledge Based Systems, 2002, 10(5): 557-570.
  • 4CHOW C Y, MOKBEL M F. Privacy in location-based services: a system architecture perspective[J]. SIGSPATIAL Special, 2009, 1(2): 23-27.
  • 5MOKBEL M F, CHOW C Y, AREF W G. The new Casper: query processing for location services without compromising privacy[A]. VLDB[C]. Seoul Korea, 2006.763-774.
  • 6XIAO Z, MENG X, XU J. Quality aware privacy protection for loca- tion-based services[A]. DASFAA[C]. Thailand, 2007.434-446.
  • 7GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18.
  • 8BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. WWW[C]. Bei- jing, China, 2008.237-246.
  • 9WANG Y, XU D, HE X, et al. L2P2: location-aware location privacy protection for location-based services[A]. 1NFOCOM[C]. Orlando, FL USA, 2012.1996-2004.
  • 10SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. .Protecting location privacy: optimal strategy against localization at- tacks[A]. CCS[C]. North Carolina, USA, 2012.617-627.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部