期刊文献+

同态加密的百万富翁问题高效解决方案 被引量:6

An Efficient Homomorphic Encryption Based Solution to Millionaires' Problem
下载PDF
导出
摘要 安全多方计算问题由图灵奖得主姚期智于上世纪八十年代首先提出,现在已经成为密码学的一个重要研究方向.百万富翁问题是多方安全计算研究的热点问题之一,也是其他安全多方计算协议的基本构成模块,但现有的解决方案效率低下,因而会影响其他安全多方协议的效率.基于同态加密算法,通过对保密的数据进行0-1编码,设计了一个计算百万富翁问题的协议,并利用模拟范例对协议进行安全性证明.通过效率分析显示我们的方案是简单、高效的.最后利用这个新的协议作为基本模块,设计了一个保密数据查询问题的协议,并给出了应用实例. Secure Multi-party Computation was first proposed by A. C. Yao in 1980s. Now,it is a new and important area of cryptography. The millionaires' problem is an important problem in secure multiparty computation and a basic building block of secure multiparty computation protocol. But known solutions are not efficient enough and thus affect the efficiency of many secure multiparty computation protocols. In this paper, we first propose a 0-1 encoding scheme to encode private numbers;then based the new encoding scheme and a homomorphic encryption scheme, we design a protocol for millionaires' problem and prove that the protocol is secure in the semi-honest model using the simulation paradigm. The performance analysis indicates that our protocol is simpler and more efficient than the others. Finally, we utilize this scheme to propose a solution to privacy-preserving data querying problem and show an example of its applications.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第3期455-459,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61272435)资助 陕西师范大学研究生培养创新基金项目(2015CXS029)资助
关键词 多方安全计算 百万富翁问题 同态加密 安全查询 secure multi-party computation millionaires' problem homomorphic encryption secure querying
  • 相关文献

参考文献4

二级参考文献54

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 3Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. htttp://theory.lcs.mit.edu/-oded
  • 4Cramer R. Introduction to secure computation. In: Damgaard I, ed. Lectures on Data Security-Modern Cryptology in Theory and Practice. Lecture Notes in Computer Science, Vol 1561. Springer-Verlag, 1999. 16-62.
  • 5Yao AC. Protocols for secure computation. In: Proc. of the 23rd IEEE Symp. on Foundation of Computer Science. Chicago: IEEE Computer Society, 1982. 160-164.
  • 6Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999.120~127.
  • 7Fagin R, Naor M, Winkler P. Comparing information without leaking it. Communications of the ACM, 1996,39(5):77-85.
  • 8Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley & Sons, Inc., 1996.
  • 9Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed.Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vo1.1592, Springer-Verlag, 1999.402~414.
  • 10Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc.of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998.59~66.

共引文献113

同被引文献35

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部