期刊文献+

集合相交问题的双方保密计算 被引量:4

Secure Two-Party Computation for Set Intersection Problem
下载PDF
导出
摘要 用公开密钥加密算法解决了集合相交的多方保密计算问题,并提出了3种解决方案,它们均基于参与保密比较的双方都是半诚实的.所提方案既可以使双方知道集合的交集,也可以使双方只知道交集的势,而不知道具体的交集,同时运用模拟范例证明了解决方案的保密性.该方案适用于不暴露交集的元素、向一方暴露交集的元素、向双方暴露交集的元素等3种场合,且计算复杂度较低,可以容易地推广到保密计算的多个集合相交的问题,在网络隐私保护方面具有重要的应用价值. Applying public key cryptography to the secure multi-party computation for set intersection problem, three solutions are proposed based on the assumption that both parties partici- pating the secure multi-party computation are semi-honest. By these solutions, both parties are able to know the intersection set or the cardinality of it without knowing the concrete intersection set. The privacy preserving property of these solutions is proved by simulation paradigm. These solutions are suitable for the cases in which the elements of the intersection set are kept secret, exposed to one party, or to both parties. The proposed methods have lower computational complexity and can easily be generalized to the multi-set intersection problem. They are significant in Internet privacy preserving.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2006年第10期1091-1093,1102,共4页 Journal of Xi'an Jiaotong University
基金 国家高技术发展计划资助项目(2005AA114160)
关键词 多方保密计算 交集 保密性 secure multi-party computation intersection set privacy preserving
  • 相关文献

参考文献8

  • 1Yao A C.Protocols for secure computations[C]//The 23rd IEEE Symposium on Foundations of Computer Science.Piscataway,USA:IEEE,1982:160-164.
  • 2Goldreich O,Micali S,Wigderson A.How to play any mental game[C]//Proceedings of the 19th Annual ACM Conference on Theory of Computing.New York:ACM Press,1987:218-229.
  • 3Goldreich O.Foundations of cryptography:basic applications[M].London:Cambridge University Press,2004.
  • 4Cachin C,Camenisch J.Lecture notes in computer science 3027[M].New York:Springer-Verlag,2004:1-55; 419-473.
  • 5Du Wenliang,Atallah M J.Secure multi-party computation problems and their applications:a review and open problems[C]//Proceedings of the 2001 Workshop on New Security Paradigms.New York:ACM Press,2001:13-22.
  • 6Goldwasser S.Multi-party computations:past and present[C]//The 16th Annual ACM Symposium on Principles of Distributed Computing.New York:ACM Press,1997:21-24.
  • 7Freedman M J,Nissim K,Pinkas B.Efficient private matching and set intersection[M].New York:Springer-Verlag,2004:1-19.
  • 8李顺东,覃征.一种带密钥的阈下信道通信算法[J].计算机学报,2003,26(1):125-128. 被引量:3

二级参考文献6

  • 1[1]Schneier B. Applied Cryptography Second Edition: Protocol, Algorithm, and Source Code in C. Second Edition. New York: John Wiley & Sons, 1996
  • 2[2]Simmons G J. The prisoners' problem and the subliminal channel. In: Chaum D ed. Proceedings of CRYPTO'83. California:Plenum Press, 1984. 51~67
  • 3[3]Simmons G J. A secure subliminal channel. In: Pichler F ed.Advance in Cryptology--EUROCRYPTO' 85. New York:Springer-Verlag, 1986. 33~41
  • 4[4]Seberry J. A subliminal channel in codes for authentication with out secrecy. Ars Combinatorica, 1985, 19(A): 337~342
  • 5[5]Simmons G J. Subliminal channel: Past and present. European Transactions on Telecommunication, 1994, 5(4) : 459~473
  • 6[6]Davis M D, Weyuker E J. Computability, Complexity, and Languages Fundamentals of Theoretical Computer Science. New York: Academic Press, 1983

共引文献2

同被引文献31

  • 1李顺东,司天歌,戴一奇.集合包含与几何包含的多方保密计算[J].计算机研究与发展,2005,42(10):1647-1653. 被引量:21
  • 2罗永龙,黄刘生,仲红.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science & Technology,2007,22(1):88-91. 被引量:16
  • 3Yao A C. Protocols for secure computations [ C]//Proceedings 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
  • 4Du Wenliang. A study of several specific secure two-party computation problems[D]. West Lafayette: Purdue University, 2000.
  • 5Du Wenliang, Atallah M J. Privacy-preserving cooperative scientific computations[C]//Proceedings 14th IEEE Computer Security Foundations Workshop. Nova Scotia: [s. n. ], 2001 : 273-282.
  • 6Cramer R, Kiltz E, Padro C. A note on secure computation of the moore-pnerose pseudoinverse and its application to secure linear algebra[ C]///Menezes A. CRYPTO 2007. Heidelberg: Springer-Verlag, 2007: 513-630.
  • 7Howie J M. Fundamentals of semigroup theory [ M ]. London: Oxford University Press, 1995. 45-63.
  • 8李顺东,戴一奇,王道顺,罗平.几何相交问题的多方保密计算[J].清华大学学报(自然科学版),2007,47(10):1692-1695. 被引量:11
  • 9YAO A C. Protocols for Secure Computations EC//In proceedings of the 23rd Annual IEEE Symposiumon Foundations of Computer Science. Chicago, USA. 1982: 160-164.
  • 10GOLDREICH O, MICALI S, WIGDERSON A. How to Play Any Mental Game EC//Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, USA. 1987: 218-229.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部