期刊文献+

基于分布式线性方程组求解的安全多方计算协议 被引量:4

Secure Protocols for Resolving Distributed System of Linear Equations
下载PDF
导出
摘要 不同组织之间的合作关系常用求解线性方程组或线性不等式组等线性代数问题来建模。当合作过程中涉及到数据的隐私保护时,一般直接求解线性方程组的方法将不再适用。文章为解决此类问题,基于同态加密方式设计了求解分布式线性方程组的安全两方计算协议和安全多方计算协议。与以往基于茫然传输协议设计的安全计算协议相比,降低了协议的通信复杂度。文章给出了协议的正确性、安全性和复杂度分析。 The cooperation between different organizations is often modeled as solving linear algebra problems, such as linear system of equations or linear inequalities. If participants concern about the data privacy in the process of cooperation, common method of directly solving linear system of equations will no longer apply. This paper designs a secure two-party protocol and a secure multi-party protocol based on homomorphic encryption scheme for solving distributed linear system of equations. Compared to the protocols based on oblivious transfer protocol, the communication complexity is reduced. This paper also gives the correctness, security and complexity analysis.
作者 陈莉 林柏钢
出处 《信息网络安全》 2013年第9期2-5,共4页 Netinfo Security
基金 国家自然科学基金[60175022] 福建省安全课题[822711]
关键词 安全多方计算 同态加密 分布式线性方程组 安全计算协议 secure multi-party computation homomorphic encryption distributed system of linear equations
  • 相关文献

参考文献6

  • 1Yao A. C. Protocols for secure computation[C]. Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, 1982: 160- 164.
  • 2Wenliang Du. Privacy-preserving cooperative scientific computations[C]. Proceedings of the computer security of foundations workshop,2001: 273-282.
  • 3罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 4K. Nissim and E. Weinreb. Communication efficient secure linear algebra[C]. In the Third Theory of Cryptography Conference, 2006: 522- 541.
  • 5E. Kiltz, P. Mohassel, E. Weinreb et al. Secure linear algebra using linearly recurrent sequences[C]. In the 4th Theory of Cryptography Conference, Amsterdam, The Netherlands, 2007: 291-310.
  • 6P. Pallier. Public-key cryptosystems based on composite degree residuosity classes[C]. In Advances in Cryptology-EUROCRYPT, 1999: 223-238.

二级参考文献14

  • 1Yao A.. Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles, 1982, 160~164
  • 2Golderich O., Micali S., Wigderson A.. How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 1987, 218~229
  • 3Lindell Y.. On the composition of secure multi-party protocols[Ph.D. dissertation]. The Weizmann Institute of Science, Israel, 2002
  • 4Du Wenliang. A study of several specific secure two-party computation problems[Ph.D. dissertation]. Purdue University,USA, 2000
  • 5Cachin C., Micali S., Stadler M.. Computationally private information retrieval with polyogarithmic communication. In: Proceedings of Eurocrypt'99, Prague, Czech Republic, 1999, 308~318
  • 6Chor B., Gilboa N.. Computationally private information retrieval(extended abstract). In: Proceedings of the 29th ACM Symposium on Theory of Computing, El Paso, Texas, USA, 1997, 304~313
  • 7Du Wenliang, Atallah M.J.. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 273~282
  • 8Luo Wen-Jun, Li Xiang. A study of secure multi-party statistical analysis. In: Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, 2003, 377~382
  • 9Luo Wen-Jun, Li Xiang. A study of secure multi-party elementary function computation protocols. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, 2004, 5~12
  • 10Naor M., Pinkas B.. Distributed oblivious transfer. In: Proceedings of Asiacrypt'00, 2000, 200~219

共引文献33

同被引文献23

引证文献4

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部