期刊文献+

保护私有信息的最近点对协议 被引量:4

A Protocol for Privacy-Preserving Closest-Pair of Points
下载PDF
导出
摘要 基于保护私有信息的计算几何问题是安全多方计算的研究热点之一,在军事、商业等领域具有重要的应用前景。研究了几何计算中的最近点对问题,提出保护私有信息的最近点对问题解决方案,在此基础上结合已有的基础协议,设计了一种基于保护私有信息的最近点对协议。对该协议的安全性和复杂度进行了分析。对该问题进行适当的推广,可使之具有更大的实用性。 At present,research on privacy- preserving computational geometry is of great interest in the field of secure multi- party computation. It can be applied in many fields, such as military field and commerce field. Focuses on the closest - pair of points problem in the computational geometry and a privacy - preserving solution to this problem is proposed. Based on this solution and combined with the knowledge of a set of basal secure protocols, a protocol for privacy - preserving closest- pair of points is further proposed, analysed the security and computational complexity. Finally, extends this problem properly to make it more practical.
出处 《计算机技术与发展》 2008年第12期153-155,158,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(60773114) 安徽省自然科学基金资助项目(070412051) 安徽高校省级重点自然科学研究项目(KJ2007A043)
关键词 最近点对 私有信息 点积协议 茫然第三方 closest- pair of points privacy information scalar product protocol oblivious third party
  • 相关文献

参考文献12

  • 1Yao A C. Protocols for secure computations[ C]// In proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago, USA: [ s. n. ], 1982:160 - 164.
  • 2Atallah M J, Du Wenliang. Secure Multi - party Computational Geometry[J]. Lecture Notes In Computer Science, 2001,2125 : 165 - 179.
  • 3Du Wenliang, Atallah M J. Secure Multi- Party Computation Problems and Their Applications: A Review and Open Problems[C]//In Proceedings of New Security Paradigms Wordshop. Cloudcroft, New Mexioo: [ s. n. ], 2001 : 11 - 20.
  • 4Clarkson K L, Yao A C. Algorithms for closest-- point problems(computational geometry)[D]. Stanford, USA:Stanford University Press, 1985.
  • 5Su Peter. Algorithms for Closest Point Problems:Practice and Theory[ R]. Nathan Smith Building Hanover, USA: Dartmouth College Press, 1992.
  • 6Wang Chih- fang, Sahni S. Computational Geometry on The OTIS- Mesh Optoelectronie Computer [ C]//ICPP. [ s. l. ] : IEEE Computer Society, 2002: 501 - 510.
  • 7江铭辉,古熙悠.Engineering the Divide-and-Conquer Closest Pair Algorithm[J].Journal of Computer Science & Technology,2007,22(4):532-540. 被引量:2
  • 8Du Wenliang, Zhan Zhijun. A practical approach to solve secure multi- party computation problems[ C]//In New Security Paradigms Workshop. Virginia Besch, Virghla, USA: [ s. n. ] ,2002 : 127 - 135.
  • 9仲红.安全多方计算的关键技术分析[J].安徽农业大学学报,2007,34(2):291-295. 被引量:2
  • 10Ioannidis I, Grama A, Atallah M. A secure Protocol fear computing dot - products in clustered and distributed environments [ C]//In the 2002 International Conference on Parallel Proceasing. Los Alamitos: IEEE Computer Society Press, 2002: 379 - 384.

二级参考文献18

  • 1葛启,王海涛,朱洪.An Improved Algorithm for Finding the Closest Pair of Points[J].Journal of Computer Science & Technology,2006,21(1):27-31. 被引量:4
  • 2ZHONG Hong,HUANG Liusheng,XIONG Yan.A Weighted E-Voting Scheme with Secret Weights[J].Chinese Journal of Electronics,2006,15(3):413-416. 被引量:6
  • 3仲红,黄刘生,罗永龙.基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展,2006,43(8):1405-1410. 被引量:39
  • 4WenboMao.现代密码学理论与实践[M].北京:电子工业出版社,2004..
  • 5Ben-Or M,Goldwasser S,Wigderson A.Completeness theorems for noncrypographic fault-tolerant distributed computation[C]//Proc of 20th ACM symposium on the theory of computing (STOC'88).New York:ACM Press,1988:1-10.
  • 6Hirt M,Nielsen J B.Robust multiparty computation with linear communication complexity[C]//Advances in Cryptology -CRYPTO 2006,LNCS4117.Berlin:Springer-Verlag,2006:463-482.
  • 7Stadler M.Publicly verifiable secret sharing[C]//Advances in Cryptology-EUROCRYPT '96,LNCS1070.Berlin:Springer-Verlag,1996:190-199.
  • 8Schoenmaker B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[C]//Advances in Cryptology (CRYPTO'99),LNCS 1666.Berlin:Springer-Verlag,1999:148-164.
  • 9Goldwasser S,Micali S.Probabilistic encryption[J].Journal of Computer and System Sciences,1984,28(2):270-299.
  • 10Benaloh J.Dense probabilistic encryption[C]//Proc of the workshop on selected areas of cryptography (SAC'94).Kingston,Canada,1994:120-128.

共引文献3

同被引文献31

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部