期刊文献+

半诚实模型下的隐私保护集合交集计算协议 被引量:1

Privacy-Preserving Set Intersection Computation Protocol in the Semi-honest Model
下载PDF
导出
摘要 鉴于给定的安全级别,椭圆曲线(ECC)比RSA和一般域上的离散对数计算速度快、密钥更短等优点.本文提出将集合的元素编码到椭圆曲线上,基于椭圆曲线上的三个困难问题(DL问题、CDH问题、DDH问题)假设,提出半诚实模型下的隐私保护集合交集汁算协议.整个方案构造新颖、简单,计算量小.与已有方案比较,计算复杂性和通信复杂性都达到了最低. Because the ECC is faster than RSA and discrete logarithm in computation and other proper -ties for the same security grade. The novel solution to set intersection protocol is presented in semi-honest model which is based on three difficult problems (DL ;CDH ;DDH). The new scheme has the advantages of simple structure ,novelty ,small computational cost ,but computation complexity and communication complexity has reached the optimum.
作者 吴春英
出处 《青海师范大学学报(自然科学版)》 2014年第3期9-13,共5页 Journal of Qinghai Normal University(Natural Science Edition)
基金 春教育部春晖计划(Z2014021)
关键词 集合交集 隐私保护 椭圆曲线 set intersection privacy preservation elliptic curve
  • 相关文献

参考文献12

  • 1M. J. Freedman, K. Nissim, B. Pinkas. Efficient private matching and set intersection[C]// Advances in Cryptology EUROCRYPT' 04. Springer Berlin Heidelberg, 2004: 1--19.
  • 2M. J. Freedman, et al. Keyword search and oblivious pseudorandom functions [M]//Theory of Cryptography. Springer Berlin Heidel- berg, 2005: 303--324.
  • 3L. Kissner, D. Song. Privacy-preserving set operations[C]//Advances in Cryptology CRYPTO05. Springer Berlin Heidelberg, 2005: 241--257.
  • 4Y. Sang, H. Shen. Privacy preserving set intersection protocol secure against malicious behaviors[C]//Parallel and Distributed Compu- ting, Applications and Technologies, 2007. PDCAT'07. Eighth International Conference on. IEEE, 2007: 461--468.
  • 5C. Hazay, K. Nissim. Efficient set operations in the presence of malicious adversaries[J]. Journal of cryptology, 2012, 25(3): 383-- 433.
  • 6C. Hazay, Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries [J]. Journal of cryptology, 2010, 23(3): 422--456.
  • 7E. De Cristofaro, et al. Practical private set intersection protocols with linear complexity[M]//Financial Cryptography and Data Securi- ty. Springer Berlin Heidelberg, 2010.. 143-- 159.
  • 8D. Dachman-Soled, T. Malkin, et al. Efficient robust private set intersection[J]. International Journal of Applied Cryptography, 2012, 2(4) : 289--303.
  • 9S. Jarecki, X. Liu. Fast secure computation of set intersection[M]//Security and Cryptography for Networks. Springer Berlin Heidel- berg, 2010: 418--435.
  • 10J. A. Solinas. Efficient arithmetic on Koblitz curves[J]. Designs, Codes and Cryptography, 2000, 19(2--3) : 195--249.

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部