期刊文献+

安全判定两组数据对应成比例的新方法 被引量:1

A new secure method for determing two sets of data proportional correspondly
下载PDF
导出
摘要 针对秘密判定两组数据对应成比例问题提出一种新的解决方案,即运用同态加密方案设计一个安全求解两组数据中对应成比例个数协议,并利用此协议进一步设计出安全判定两组数据对应成比例协议和安全判定空间中两平面的位置协议。该方法不但解决了安全判定两组数据对应成比例问题,还解决了空间两平面的相对位置判定问题。与以前的解决方案相比,设计方案不但提高了协议的效率,还降低了通信量。 Aiming at a secret to judge two sets of data proportional correspondly problem, this paper puts forward a new solution, which uses homomorphic encryption to design a safety protocol for computing piece of two sets of datas proportional correspondly. And by using this protocol, it designs a safety protocol for determining two sets of datas proportional correspondly and a safety protocol for determining two spatial flat surface related position. This method not only solves a secret to judge two sets of datas proportional correspondly problem but also solves two spatial fiat surface related position determining problem. Compared with other solutions, this method not only raises the efficiency of the protocol but also lowers correspondence.
出处 《微型机与应用》 2011年第13期36-38,共3页 Microcomputer & Its Applications
基金 国家自然基金项目(60773114) 安徽高校省级重点自然科学研究项目(KJ2010A009)
关键词 计算几何 数据对应成比例个数 数据对应成比例协议 computational geometry piece of data proportional correspondly data proportional correspondly protocol
  • 相关文献

参考文献6

  • 1YAO A C. Protocols for secure computations [C] . In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, USA, 1982: 160-164.
  • 2ATALLAH M J, Du Wenliang. Secure multi-party computational geometry [C]. The 7th Int'l Workshop on Algorithms and Data Structures(WADS 2001), Providence, Rhode Island, USA, 2001,2125:165-179.
  • 3罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 4丘维声.解析几何[M].北京:北京大学出版社,1996.
  • 5ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Transactions on Information Theory, 1985,31(4):469-472.
  • 6PAILLIER P. Public--key cryptosystems based on composite degree residuosity classes [C]. Advances in Cryptology- EUROCRYPT'99, Lecture Notes in Computer Science, Springer-Verlag, 1999,1592:223-238.

二级参考文献11

  • 1O. Gotdreich. Secure multl-party computation (manuscript version 1.3). http ://theory. lcs. mit. edu/- oded, 2002.
  • 2A. C. Yao. Protocols for secure computations. In: Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science.Los Alamitos: IEEE Computer Society Press, 1982. 160 - 164.
  • 3C. Cachin. Efficient private bidding and auctions with an oblivious third party. In: Proe. 6th ACM Conf. Computer and Communications Security. New York: ACM Press, 1999. 120-127.
  • 4A. C. Yao. How to generate and exchange secrets. In; Proe.27th IEEE Symposium on Foundations of Computer Science, Los Alamitos: IEEE Computer Society Press, 1986. 162- 167.
  • 5O. Goldreich, S. Micali, A. Wigderson. How to play any mental game. In: Prec. 19th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 1987. 218-229.
  • 6S. Goldwasser. Multi-party computations: Past and present, In:Proc. 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997. 1 -6.
  • 7Mikhail J. Atallah, Wenliang Du. Secure muhi-party computational geometry. In: Lecture Notes in Computer Science 2125. Berlin: Springer, 2001. 165-179.
  • 8J.Vaidya,C.Clifton.Privacy preserving association rule mining in vertically partitioncd data.In:Proc.8th ACM SIGKDD Int'l Conf.Knowledge Discovery and Data Mining.New York:ACM Press,2002.639-644.
  • 9I. Ioannidis, A. Grama, M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments,In:Proc.2002 Int'l Conf.Paralel Processing.Los Alamitios:IEEE Computer Society Press,2002.379-384.
  • 10C. Clifton, M. Kantarcioglu, et al. Tools for privacy preserving distributed data mining. SIGKDD Explorations, 2002, 4 (2) : 28-34.

共引文献52

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部