期刊文献+

排序问题的多方保密计算协议 被引量:8

Secure Multi-Party Computation Protocol for Sorting Problem
下载PDF
导出
摘要 为了解决多方参与的保密排序问题,提出了基于保密排序的隐私保护解决方案.该方案首先假设多方保密计算的参与者为半诚实的,即参与者在协议执行过程中将忠实地执行协议,但可能保留计算的中间结果,以试图推导出其他参与者的输入,然后给定参与者与数据的对应集合关系,并利用离散对数方法计算数据数组以获取其置换结果,从而使得参与者知道且只知道自己的数据在置换后的数组中的位置.模拟范例证明了所提方案具有一定保密性,且特别适用于解决计算机网络中的隐私保护问题. In order to solve multi-party participating secure sort problem, schemes based on privacy-preserving are proposed, in which that all participants of a secure computation are semi-honest is first assumed, i.e. each participant will execute the protocol loyally, but he (or she) keeps a record of all his (her) intermediate computing results and might try to derive other participant' s private inputs from the record. Afterwards, given a corresponding collective relation between participants and their data, and using the discrete logarithm method the array is calculated to obtain permutation result, such that a participant knows and only knows the position of his and her data in the permutation array. It is proved, by simulation paradigm, that the proposed schemes are secure, and particularly suitable for solving privacy preserving problems in network.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2008年第2期231-233,255,共4页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60673065) 国家高技术发展计划资助项目(2005AA114160)
关键词 密码学 多方保密计算 隐私保护 协议 cryptography multi-party secure computation privacy-preserving protocol
  • 相关文献

参考文献8

  • 1YAO A C. Protocols for secure computations [C]// Proceedings of the 23th IEEE Symposium on Foundations of Computer Science. Los Alamitos,USA: IEEE Computer Society Press, 1982:160-164.
  • 2GOLDWASSER S. Multi-party computations: past and present [C] ff Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997:21-24.
  • 3CRAMER R, DAMGAARDL I. Introduction to secure multi-party computations [EB/OL]. [2005-12- 10]. http://homepages. cwi. nl ∧cramer/.
  • 4GOLDREICH O, MICALI S, WlGDERSON A. How to play ANY mental game [C] // Proceedings of the 19th Annual ACM Conference on Theory of Computing. New York: ACM Press, 1987.218-229.
  • 5COLDREICH O. Foundations of cryptography: basic applications [ M ]. London: Cambridge University Press, 2004.
  • 6DU Wenliang, ATALLAH M J. Secure multi-party computation problems and their applications: a review and open problems [C] // Proceedings of New Security Paradigms Workshop. New York: ACM Press, 2001 : 13-22.
  • 7SUSILO W, SAFAVI R, GYSIN M, et al. A new and efficient fail-stop signature scheme [J]. The Computer Journal, 2000, 43 (5) :430-437.
  • 8SCHNEIER B. Applied cryptography, protocol, algorithm and source code in C [M]. New York: John Wiley & Sons Inc. , 1996.

同被引文献65

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部