期刊文献+

无信息泄漏的最近点对协议 被引量:2

Two protocols for no-information leaked closest-pair of points
下载PDF
导出
摘要 安全多方计算(SMC)在解决网络环境下进行合作时的信息安全问题具有重要价值,因此,保护私有信息的安全多方计算是目前一个研究热点。分别利用数据扰乱技术和基于求解离散对数难题,在保护私有信息条件下,提出了两个求解几何计算中的最近点对问题的协议,并对这两个协议的安全性和计算复杂度进行了分析。 Secure Multi-party Computation(SMC) plays an important role in information security under the circumstance of network cooperation, so SMC on privacy-preservation is of great interest.Based on data perturbation and discrete logarithm problem,two protocols are proposed which are used to solve the problem of closest-pair of points under the condition of privacy-preservation.Further more,the security and computational complexity are analyzed.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第34期80-81,101,共3页 Computer Engineering and Applications
基金 国家自然科学基金(No.60773114) 安徽省自然科学基金(No.070412051) 安徽高校省级重点自然科学研究项目(No.KJ2007A43)~~
关键词 最近点对 私有信息 数据扰乱 离散对数 closest-pair of points privacy-preservation data perturbation discrete logarithm
  • 相关文献

参考文献5

二级参考文献40

  • 1葛启,王海涛,朱洪.An Improved Algorithm for Finding the Closest Pair of Points[J].Journal of Computer Science & Technology,2006,21(1):27-31. 被引量:4
  • 2J Benaloh, D Tuinstra. Receipt-free secret-ballot elections [C].In: Proc of the 26th ACM Symposium on Theory of Computing. New York: ACM Press, 1994. 544-553
  • 3J Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast [G]. In: Proc of the 8th Int'l Conf on Financial Cryptography ( FC2004 ), LNCS 3110. Berlin:Springer-Verlag, 2004. 90-104
  • 4R Cramer, M Franklin, B Schoenmakers, et al. Multauthority secret-ballot elections with linear work [G]. In: Advances in Cryptology-Eurocrypt' 96, LNCS 1070. Berlin: Springer-Verlag, 1996. 72-83
  • 5R Cramer, R Gennaro, B Schoenmakers. A secure and optimally efficient multi-authority election scheme [G]. In:Advances in Cryptology-Eurocrypt' 97, LNCS 1223. Berlin:Springer-Verlag, 1997. 103-118
  • 6I Damgard, M Jurik. A generalisation, a simplication and some applications of Paillier' s probabilistic public-key system [G].In: The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001 ), LNCS 1992. Berlin:Springer-Verlag, 2001. 119-136
  • 7O Goldreich. Secure multi-party computation (working draft)[OL]. http://www. wisdom. weizmann. ac. il/home/oded/publichtml/foc. html, 1998
  • 8K H Rosen. Elementary Number Theory and Its Applications[M]. New York: Addition Wesley, 1984
  • 9H Cohen. A Course in Computational Algebraic Number Theory[M]. Berlin: Springer, 1993
  • 10D E Knuth. The Art of Computer Programming: Semi-Numerical Algorithms [M]. Volume 2. New York: Addition Wesley, 1981

共引文献73

同被引文献22

  • 1李顺东,司天歌,戴一奇.集合包含与几何包含的多方保密计算[J].计算机研究与发展,2005,42(10):1647-1653. 被引量:21
  • 2仲红,黄刘生,罗永龙.基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展,2006,43(8):1405-1410. 被引量:39
  • 3李顺东,窦家维,贾晓林.集合相交问题的双方保密计算[J].西安交通大学学报,2006,40(10):1091-1093. 被引量:4
  • 4罗永龙,黄刘生,仲红.Secure Two-Party Point-Circle Inclusion Problem[J].Journal of Computer Science & Technology,2007,22(1):88-91. 被引量:16
  • 5Chaum D.Untraceable electronic mail, return addresses and digital pseudonyms[J].Communications of the ACM, 1981, 24(2) : 84-88.
  • 6Cohen J D, Fischer M J.A robust and verifiable crypto- graphically secure election scheme[C]//Proc of the 26th IEEE Symp on Foundations of Computer Science,1985: 372-382.
  • 7Magkos E, Burrnester M, Chrissikopoulos V.Receipt-fi'eeness in large scale elections without untappable channels[C]//Proc of the 1st Conf on Ecommerce/E-business/ E-Government, 2001 : 683-693.
  • 8Cranor L F, Cy R K.Sensus a security-conscious elec- tronic polling system for the Internet[C]//Proceedings of the 13th Hawaii International Conference on System Science, 1997 : 561-570.
  • 9Cranor L F,Cy R K.Disign and implementation of a security-conscious electronic polling system, Technical Report, WUCS-96-02[R].Washington University, 1996.
  • 10Cramer R, Franklin M, Schoenmakers B.Multi-authority secret-ballot elections with linear work[C]//Proceedings of EUROCRYPT' 96,1996 .. 72-83.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部