期刊文献+

恶意模型下计算欧几里德距离的协议 被引量:3

Secure Euclidean distance computation in presence of malicious adversaries
下载PDF
导出
摘要 安全多方计算(MPC)是一个允许多个参与方在保持各自输入隐私的前提下联合计算一个函数。Yao和Goldreich等人(STOC’87)开创性的工作表明,存在陷门置换的前提下,任何一个函数都存在安全多方计算协议,并给出了安全多方计算的一个通用解决方案,但是该方案由于效率问题而不实用。因此,Goldreich同时指出需要针对特定问题提出特定的安全多方计算协议。提出了一个新的基于分布式EI Gamal加密的计算两个向量欧几里德距离的安全协议,并在混合模型下给出了协议的安全性证明。与原来的方案比较,该协议的计算和通信复杂度都较低,适用于计算和通信能力都有限的应用环境。 Secure Multiparty Computation(MPC)deals with protocols that allow a group of agents to jointly compute a function of their individual private inputs. Nothing is revealed except the value of function in the end. Even though Yao and Goldreich et al.(STOC'87)have already proposed the general solution of any function, the general MPC has been proven to be inefficient and impractical. It is necessary to construct special MPC protocol for special problem. In this paper,a new scheme which can evaluate the Euclidean distance between two vectors is proposed. This scheme is based on distributed EI Gamal encryption, and is proven secure in the hybrid model. Compared with the previous schemes, this scheme has lower computation and communication complexity. It can be suitable to the circumstances which are computation and communication limited.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第24期109-113,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61272436 No.61370224) 广东省自然科学基金(No.10351806001000000) 广东教育研究院项目(No.GDJY-2014-B-b278) 广州市教育局项目(No.1201421409)
关键词 安全多方计算 欧几里德距离 分布式EI Gamal加密 secure multiparty computation Euclidean distance distributed EI Gamal encryption
  • 相关文献

参考文献16

  • 1Yao A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science(SFCS’82),1982:160-164.
  • 2Yao A C.How to generate and exchange secrets[C]//Proceedings of the 27th Annual Symposium on Foundations of Computer Science(SFCS’86),1986:162-167.
  • 3Goldreich O,Micali S,Wigderson A.How to play ANY mental game[C]//Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing(STOC’87),1987:218-229.
  • 4Brandt F.Efficient cryptographic protocol design based on distributed El Gamal encryption[C]//Proceedings of the8th International Conference on Information Security and Cryptology,ICISC’05,2006.
  • 5Goyal V.Constant round non-malleable protocols using one way functions[C]//STOC,2011:695-704.
  • 6Halevi S,Lindell Y,Pinkas B.Secure computation on the web:computing without simultaneous interaction[C]//LNCS6841:Advances in Cryptology-CRYPTO’2011,2011:132-150.
  • 7Asharov G,Jain A,Wichs D.Multiparty computation with low communication,computation and interaction via threshold FHE[EB/OL].[2013-10-09].http://eprint.iacr.org/2011/613.
  • 8Beimel A,Lindell Y,Omri E,et al.1/n-secure multiparty computation without honest majority and the best of both worlds[C]//LNCS 6841:Advances in CryptologyCRYPTO’2011,2011:277-296.
  • 9Asharov G,Lindell Y.Perfectly-secure multiplication for any t.
  • 10Jain A K,Prabhakar S,Hong L,et al.Finger Code:a filterbank for fingerprint representation and matching[C]//IEEE Computer Society Conference on Computer Vision and Pattern Recognition,1999.

同被引文献44

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部