期刊文献+

非线性方程和方程组求解的安全两方计算协议 被引量:1

The Secure Two-party Protocols of Nonlinear Equation and Nonlinear Systems of Equations
下载PDF
导出
摘要 以实系数一元二次方程为研究对象,给出针对非线性方程的安全计算协议。在半诚实模型下,协议能够完成求解的计算任务,并且协议的正确性和保密性也得到了论述。在求解一元二次方程安全两方协议的基础上,对两种类型的二次方程组进行了研究,进一步给出相应情形下的安全两方计算协议。 The secure two-party computation problem of the quadratic equation in one unknown with real coeffi-cients is studied, the protocol is proposed. In the semi-honest model, the protocol can complete the task satisfying privacy and correctness. Then protocols of two kind systems of nonlinear equations are given based on that one.
出处 《计算机科学与探索》 CSCD 2009年第1期98-104,共7页 Journal of Frontiers of Computer Science and Technology
基金 黑龙江省教育厅科学研究项目 哈尔滨师范大学骨干教师资助计划项目~~
关键词 安全两方计算协议 一元二次方程 不经意传输OT1p协议 secure two-party computation protocol quadratic equation with one unknown oblivious transfer 1 outof p protocol
  • 相关文献

参考文献2

二级参考文献25

  • 1Yao A.. Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles, 1982, 160~164
  • 2Golderich O., Micali S., Wigderson A.. How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 1987, 218~229
  • 3Lindell Y.. On the composition of secure multi-party protocols[Ph.D. dissertation]. The Weizmann Institute of Science, Israel, 2002
  • 4Du Wenliang. A study of several specific secure two-party computation problems[Ph.D. dissertation]. Purdue University,USA, 2000
  • 5Cachin C., Micali S., Stadler M.. Computationally private information retrieval with polyogarithmic communication. In: Proceedings of Eurocrypt'99, Prague, Czech Republic, 1999, 308~318
  • 6Chor B., Gilboa N.. Computationally private information retrieval(extended abstract). In: Proceedings of the 29th ACM Symposium on Theory of Computing, El Paso, Texas, USA, 1997, 304~313
  • 7Du Wenliang, Atallah M.J.. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 273~282
  • 8Luo Wen-Jun, Li Xiang. A study of secure multi-party statistical analysis. In: Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, 2003, 377~382
  • 9Luo Wen-Jun, Li Xiang. A study of secure multi-party elementary function computation protocols. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, 2004, 5~12
  • 10Naor M., Pinkas B.. Distributed oblivious transfer. In: Proceedings of Asiacrypt'00, 2000, 200~219

共引文献41

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部