期刊文献+

基于卷积的安全双方计算问题 被引量:1

A Secure Two-party Computation Problem Based on the Convolution
下载PDF
导出
摘要 经典的安全双方问题一直专注于零信息泄露的模式,虽然这是理想的安全双方模型,但在实际的安全双方计算中需要付出昂贵的代价且效率不高。本文在传统安全双方的问题上构建卷积安全双方问题,并基于此问题建立不公开信息和需要部分信息公开的安全双方计算模型,提供一种兼顾安全和效率的方法。 The classic security two-party computation problem has focused on the mode of zero information leak- age, Although it is the ideal model for the security computation, it is costly and inefficient in the actual calcula- tions. The convolution security two-party computation problem was proposed from the traditional model. A secure of no-information-disclosed calculation model and a secure issue of some information disclosure were established based on the convolution two-party computation problem, which provided a method for balance between safety and efficiency in the security two-party computation problem.
出处 《贵州大学学报(自然科学版)》 2016年第1期52-57,共6页 Journal of Guizhou University:Natural Sciences
基金 国家自然科学基金项目资助(61262006)
关键词 安全双方问题 卷积安全双方问题 信息公开 security two-party computation problem convolution security two-party computation problem infor-mation disclosure.
  • 相关文献

参考文献15

  • 1Yao A C. Protocols for secure computations [ C ]//Symposium on Foun- dations of Computer Science, Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Berkeley, California: Symposium on Foundations of Computer Science, 1982:160-154.
  • 2Goldreich O,Micali S,Wigderson A.How to play any mental game [J].In Proc of 19th STOC,1987,22(11) :11-13.
  • 3Lindell Y, Pinkas B. Privacy preserving data mining [ J ]. SpringerBerlin Heidelberg, 2000,1880 ( 3 ) : 36- 54.
  • 4Malkhi D, Nisan N, Pinksa B. Fairplay A secure two party compu- tation system [ J ]. In Usenix Security Symposium, 2004, 13 ( 4 ) : 287-302.
  • 5Minyao M.Research on secure multi-party computation and its ex- tended problems [M] .Beijing:Beijing university of Posts and Tele- communications Press, 2010 : 109-117.
  • 6Atallah M J, Du W. Secure multi- party computational geometry [ J]. International Workshop on Algorithms & Data Structures, 2004, 2125: 165-179.
  • 7Pinkas B.Cryptographic techniques for privacy preserving data min- ing [ J ].Acm Sigkdd Explorations Newsletter, 2002,4 (2) : 12-19.
  • 8Lindell Y,Pinkas B.Secure multiparty computation for privacy pres -erving data mining[ J] .Journal of the ACM ,2009,1 (1) :59-98.
  • 9Salman N, Babak S, Payman M, Seyed S S. A Privacy- Preserving intrusion detection system using secure Two-Party computation pro- tocols[J] .Comput.J,2014,57(4):494-509.
  • 10Dankar F, Brien R, Adams C, et al. Secure multi-party linear re- gression [ C ]. Ottawa : EDBT/ICDT Workshops, 2014 : 406-414.

同被引文献14

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部