期刊文献+

三个保密计算服务协议 被引量:2

Three specific secure computation service protocols
下载PDF
导出
摘要 引入保密计算服务的概念,研究了三个具体的保密计算服务问题,提出了基于随机变换的保密计算解决方案.对广泛接受的模拟范例进行扩展,用扩展的模拟范例证明了提出的三个保密计算服务协议是安全的.利用保密计算服务协议,接受计算服务的一方可以用很少的计算资源解决复杂的计算问题,同时又可以保证问题的机密. The concept of secure computation service is introduced;three specific secure computation service problems and discussed are their solutions are proposed based on random transformation.A well-accepted simulation paradigm is extended to secure computation service,and the extended simulation paradigm shows that the proposed protocols are private.Using these protocols,the service receiver can solve very complicated computation problems with very limited computing power without disclosing the privacy of the computation problems.
作者 李顺东
出处 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第4期1-6,12,共7页 Journal of Shaanxi Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(60673065) 陕西省科技攻关项目(2008K01-58)
关键词 密码学 保密计算服务 实例 协议 cryptography secure computing service instance protocol
  • 相关文献

参考文献8

  • 1Feigenbaum J, Can You. Take advantage of someone without Having to trust him [C]// Williams H C. Advances in Cryptology-Crypto'85 (LNCS 218). Berlin: Springer Verlag, 1986. 477-488.
  • 2Cramer R. Damgaard I. Introduction to secure Multi- Party computations [EB/OL]. Catalano D, Cramer R, Damgard I, et al. Contemporary Cryptology, Advanced Courses in Mathematics. Birkhauser:CRM Barcelona, 2005: 41-87. http://homepages, ewi. nl/? eramer/.
  • 3Yao A. Protocols for secure computations [C] // Michael J, Seymour G, David G, et al. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago: IEEE Press, 1982: 160-164.
  • 4Goldreich O. Foundations of cryptography: Basic applications [M]. London: Cambridge University Press, 2004: 599-764.
  • 5Goldwasser S. Multi-Party computations: Past and present [-C]// Burns J E, Attiya H. Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing. New York: ACM Press, 1997: 21- 24.
  • 6Du Wenliang, Atallah M J. tation problems and their Secure Multi-Party compuapplications: a review and open problems [C]// Raskin V, Steven J G, Timmerman B, et al. Proceedings of New Security Paradigms Workshop 2001. New York: ACM Press, 2001: 13-22.
  • 7Shundong LI,Daoshun WANG,Yiqi DAI.Secure Signature Protocol[J].Intelligent Information Management,2009,1(3):174-179. 被引量:3
  • 8William P, Brian F, Saul T, et al. LU Decomposition and its applications [M]. 2nd ed. Numerical Recipes in Fortran: The Art of Scientific Computing. Cambridge: University Press, 1992: 34-42.

共引文献2

同被引文献86

  • 1李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 2罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 3Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. [2014-07-02]. http://x-integrate, de/x-in-cms, nsf]id/DE Von Regenmachern und Wolkenbruechen _-_ Impact _ 2009 _ Nachlese/MYMfile/ abovetheclouds, pdf.
  • 4Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing [J]. IEEE Security & Privacy, 2009, 7(4): 61-64.
  • 5McMillan R. Cloud computing a ' security nightmare', says Cisco CEO [EB/OL]. [ 2014- 07 -02 ]. http://www. networkworld, comnews/2009/042309-cloud-computing-a- security-nightmare, html.
  • 6Virvilis N, Dritsas S, Gritzalis D. Secure cloud storage; Available infrastructures and architectures review and evaluation [G] //LNCS 6863". Proc of Trust, Privacy and Security in Digital Business. Berlin~ Springer, 2011, 74-85.
  • 7Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978, 4(11)~ 169-180.
  • 8Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21(2) : 120-126.
  • 9Rappe R. Homomorphic cryptosystems and their applications [D]. Dortmund, Germany~ University of Dortmund, 2004.
  • 10E1Gamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory, 1985, 31 (4) ~ 469-472.

引证文献2

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部