期刊文献+

相互协作中的私有信息检索方案

Private information retrieval program in cooperation
下载PDF
导出
摘要 为了解决私有数据库信息检索面临的计算安全性和通信量之间很难达到合理的平衡状态的问题,提出一种基于任意第三方的检索方案。通过对现有的私有信息检索方案进行深入分析,找出研究的难点。基于计算不可分辨性概念以及可交换加密函数的理论,建立了一种依赖于任意第三方的私有信息检索方案。该方案充分解放了被请求方,并且可以安全高效地应用于日益频繁的相互协作查询中。对其正确性和安全性给予了分析和证明,实验结果表明了该算法的优化性。 To solve the problem of difficulty achieving the balance between computational security and traffic for information retrieval of private database,a program based on any third-party is proposed.Firstly,the difficulty of research is found out by means of deep analysis on existing private information retrieval programs.Based on the concept of indistinguishability and the theory of commutative encryption,a private information retrieval program depending on any third-party is constructed.The program fully liberates the requested party,and can be safely and efficiently applied to the increasingly frequent interaction query.The analysis and validation? of its correctness and security are carried out and the optimization of this algorithm is verified by the experiment.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第13期2959-2961,3127,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60773100)
关键词 安全多方计算 私有数据库 信息检索 任意第三方 密码学 secure multi-party computation private database information retrieval any third-party cryptography
  • 相关文献

参考文献8

二级参考文献34

  • 1李广彪,张剑云.伪随机序列及其在加密系统中的应用[J].电子测量与仪器学报,2004,18(z2):751-755. 被引量:2
  • 2罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护私有信息的布尔关联规则挖掘算法[J].电子学报,2005,33(5):900-903. 被引量:33
  • 3罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 4LUO Yonglong,HUANG Liusheng,CHEN Guoliang,SHEN Hong.Privacy-Preserving Distance Measurement and Its Applications[J].Chinese Journal of Electronics,2006,15(2):237-241. 被引量:15
  • 5Rakesh Agrawal,Tomasz Imieliński,et al.Mining association rules between sets of items in large databases[A].In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data[C].Washion D C,USA,1993.207-216.
  • 6J Vaidya,C Clifton.Privacy preserving association rule mining in vertically partitioned data[A].In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].Edmonton,Canada,2002.639-644.
  • 7R Agrawal,S Ramakrishnan.Privacy-preserving data mining[A].In Proceedings of of the 2000 ACM SIGMOD International Conference on Management of Data[C].Dallas,USA,2000.439-450.
  • 8Murat Kantarcioglu,Chris Clifton.Privacy-preserving distributed mining of association rules on horizontally partitioned data[A].Transactions on Knowledge and Data Engineering[C].IEEE Computer Society Press,Los Alamitos,CA,to appear.http://www.cs.purdue.edu/homes/clifton/document/Kantarcioglu.pdf.
  • 9Y Lindell,B Pinkas.Privacy preserving data mining[A].In Advances in Cryptology-CRYPTO'00,volume 1880 of Lecture Notes in Computer Science[C].Springer-Verlag,2000.36-54.
  • 10Wenliang Du,Zhijun Zhan.Using randomized response techniques for privacy preserving data mining[A].In Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].Washington D C,USA,2003.505-510.

共引文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部