期刊文献+

基于隐私保护的朴素贝叶斯分类协议 被引量:3

Naive Bayes Classification Protocol Based on Privacy Preservation
下载PDF
导出
摘要 针对垂直分布的数据,给出一种基于隐私保护的朴素贝叶斯分类协议。该协议利用同态加密、门限密码及数字信封技术,实现数据垂直分布时的数据分类,并保证不向其他方泄露任何与结果有关的信息。理论分析表明,该协议在满足安全性的同时具有较低的通信与计算复杂度。 Aiming at the data of vertical distribution, this paper gives a Naive Bayes Classification(NBC) protocol based on privacy preservation. This protocol uses homomorphic encryption, threshold password and digital envelope technology to realize data classification when data is vertical distribution, and it can promise not to disclose any other party with the irrelevant information. Theory analysis shows that this protocol is in safety and low communication and computing complexity.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第18期26-28,共3页 Computer Engineering
基金 国家自然科学基金资助项目"基于信用机制的移动电子商务多方位支付理论与技术研究"(60673162) "基于动态混合故障模型和进化博弈论的可生存性分析方法研究"(60970143) 北京市自然科学基金资助项目"通用可组合安全的协议分析与设计"(4082028) 教育部科学技术研究基金资助重点项目"金融信息系统可信性评价理论与验证环境研究"(109016) 中央财经大学"211工程"三期基金资助项目
关键词 数据挖掘 朴素贝叶斯分类 语义安全 同态加密 data mining Naive Bayes Classification(NBC) semantic security homomorphic encryption
  • 相关文献

参考文献6

二级参考文献16

  • 1卢开澄.计算机密码学[M](第2版)[M].北京:清华大学出版社,1998..
  • 2K Nyberg, R A Rueppel. Message recovery for signature scheme based on discrete logarithm problem [ J ]. Designs Codes and Cryptography,1996,7:61 - 81.
  • 3R J Anderson, R Needham. Robustness principles for public key protocols [ A ]. Advances in Cryptology-CRYPFO' 95 [ C ]. Springer- Verlag,1995. 236 - 247.
  • 4C L Hsu, T C Wu. Authenticated encryption scheme with ( t, n ) shared verification [ J ]. IEE. -Computer Digital Technology, 1998,145 (2) : 117- 120.
  • 5L Ham. Digital signature with ( t, n ) shared verification based on discrete logarithms [J]. Electron. Lett, 1993,29(24) :2094 - 2095.
  • 6C C Lin, C S Laih. Cryptanalysis of nyberg-rueppel's message recovery scheme [J]. IEEE Communications Letters,2000,4(7) :231 - 232.
  • 7A Miyaji. Another countermeasure to forgeries over message recovery signature [ J ]. IEICE Trans. Fundamentals, November, 1997, E80-A.(11):2191 - 2200.
  • 8W B Lee, C C Chang. Comment:Digital signature with (t, n) shared verification based on discrete logarithms [J ]. Electron. Lett, 1995,31(3) : 176 - 177.
  • 9A Shamir. How to share a secret [ J ]. Commun. ACM, 1979, 24 ( 11 ) :612-613.
  • 10M Tompa, H Woll. How to share a secret with cheaters [J] .J. Cryptology, 1988,1(2) : 133 - 138.

共引文献13

同被引文献15

  • 1葛伟平,汪卫,周皓峰,施伯乐.基于隐私保护的分类挖掘[J].计算机研究与发展,2006,43(1):39-45. 被引量:20
  • 2闭乐鹏,徐伟,宋瀚涛.基于一类SVM的贝叶斯分类算法[J].北京理工大学学报,2006,26(2):143-146. 被引量:4
  • 3Agrawal R, Srikant R. Privacy-preserving Data Mining[J]. ACM SIGMOD Record, 2000, 29(2): 439-450.
  • 4Agrawal D, Aggarwal C C. On the Design and Quantification of Privacy Preserving Data Mining Algorithms[C] //Proceedings of the 12th ACM Symposium on Principles of Database Systems. Santa Barbara, USA: [s. n.] , 2001: 247-255.
  • 5Huang Zhengli, Du Wenliang, Chen Biao. Deriving Private Infor- mation from Randomized Data[C] //Proceedings of ACM’s Special Interest Group on Management of Data. Baltimore, Maryland, USA: [s. n.] , 2005: 37-48.
  • 6Du Wenliang, Zhan Zhijun. Using Randomized Response Tech- niques for Privacy-preserving Data Mining[C] //Proceedings of the 9th ACM International Conference on Knowledge Discovery and Data Mining. Washington D. C., USA: [s. n.] , 2003: 505-510.
  • 7L A Brewlow, D W Aha. Simplifying decision trees:a survey[ J ], The Knowledge Engineering Review, 1997, 12( 1 ) : 1 -40.
  • 8A Sheth, J Larson. Federated Database Systems for Managing Dis- tributed, Heterogeneous, and Autonomous Databases [ J ]. ACM Trans. Database System, 1990,22 (3) :21 - 27.
  • 9李锴.IC卡燃气表预付费系统的研究[J].山西电子技术,2010(3):86-88. 被引量:2
  • 10张纪会,徐心和.一种新的进化算法——蚁群算法[J].系统工程理论与实践,1999,19(3):84-87. 被引量:125

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部