期刊文献+

安全查询方案的设计与实现 被引量:2

Design and Realization of Secure Query Scheme
下载PDF
导出
摘要 安全查询是指参与查询的用户一方与拥有数据库的一方在各自的私有信息互不泄露的情况下,完成查询操作。该文描述了解决查询问题的2套方案:方案1基于两方的安全计算协议,尝试将Equijoin协议应用于安全查询问题。虽然该方案安全性能高,但是由于加密通信代价太大,因此很难适应对大型数据库的查询;方案2将软件作为可信第3方的协议,只要该软件不被破解,就可确保查询用户与数据库的信息不被泄漏,尽管其安全性低于方案1,但运行代价低,方案2是一个实用的解决方案。 The secure query is that a user of a database can accomplish a query without revealing the user and database's private information. This paper presents two methods of secure query: (l)The first scheme is a protocol of secure two-party computation, which is based on the equijion protocol. Although it has high security, the first scheme has too high cost and it is too difficult to use in large database. (2)The second scheme introduces the software as a trust third part and prevents the user and database from disclosing privacy. Although the security is lower than that of the first method, the second method has lower cost and it is more practical.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第22期144-145,158,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573171) 国家"973"计划基金资助项目(2003CB317000) 安徽省教学研究基金资助项目(JYXM2005166)
关键词 安全多方计算 私有信息检索 安全查询 Secure multi-party computation Private information retrieval Safety query
  • 相关文献

参考文献6

  • 1Yao A C. Protocols for Secure Computations[C]. Proceedings of the 23^th Annual IEEE Symposium on Foundations of Computer Science,1982: 160-164.
  • 2Goldreich O. Secure Multi-party Computation(Version 1.3)[EB/OL].http://theory, lcs.mit.edu/~oded, 2002.
  • 3Du Wenliang, Zhan Zhijun. A Practical Approach to Solve Secure Multi-party Computation Problems[C]. Proc. of New Security Paradigms Workshop, Virginia Beach, Virginia, USA, 2002-09:127-135.
  • 4Agrawal R, Evfimievski A, Sfikant R. Information Sharing Across Private Databases[C]. Proceedings of ACM SIGMOD International Conference on Management of Data, 2003-06: 86-97.
  • 5Clifton C, Kantarcioglu M, Lin X, et al. Tools for Privacy Preserving Distributed Data Mining[J]. ACM SIGKDD Explorations, 2003, 4(2).
  • 6Kantarcioglu M, Clifton C. Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data[C]. Proc. of IEEE Transactions on Knowledge and Data Engineering, 2004-09:1026-1037.

同被引文献13

  • 1罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 2Yao A. Protocols for secure computations[C]. In : Proceedings of the 23 rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles: 1982, 160-164.
  • 3Luo Wenjun, Li Xiang. A study of secure multi-party statistical analysis[C]. In: Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai: 2003, 377-3821
  • 4Atallah J. Du W L. Secure multi-party computational geometry[G]. In: Seventh International Workshop on Algorithms and Data Structures (WADS2001). Providence, Rhode Island: 2001, 8-10, 165-179.
  • 5Du Wenliang. A study of several specific secure two-party computation problems [D]. USA : Purdue University, 2000.
  • 6Du Wenliang, Zhijun Zhan. A Practical Approach to Solve Secure Multiparty Computation Problems[C]. In : New Security Paradigms Workshop, 2002: 127-135.
  • 7张禾瑞,郝纳新.高等代数[M].4版.北京:高等教育出版社,1999.
  • 8Chu Cheng-Kang, Tzeng Wen-Guey. Efficient k-out-of-n Obvious Transfer Schemes with Adaptive and Non-adaptive Queries[C]// Proc. of the 8th International Workshop on Theory and Practice in Public Key Cryptography. [S. l.]: Springer-Verlag, 2005: 172-183.
  • 9Paillier P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes[C]//Proc. of Advances in Cryptology- EUROCRYPT’99. Berlin, Germany: Springer, 1999: 223-238.
  • 10Yao A C. Protocols for Secure Computations[C]//Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Washington D. C., USA: IEEE Computer Society, 1982: 160-164.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部