期刊文献+

安全向量优势协议及其应用 被引量:7

Secure Vector Dominance Protocol and Its Applications
下载PDF
导出
摘要 百万富翁问题是安全多方计算研究的热点问题之一,也是其他安全多方计算协议的基本构成模块.安全向量优势统计问题是百万富翁问题的推广,用于两方在不泄漏自己保密向量信息的前提下统计出满足大于关系的分量的数目.本文基于同态加密算法,通过对保密的数据进行编码,设计了一个计算百万富翁问题的协议,并利用模拟范例对协议进行安全性证明.然后利用这个新的协议作为基本模块,设计了一个向量优势统计协议,通过效率分析显示我们的方案是简单、高效的.最后将向量优势统计协议应用到整除判定问题和点与若干直线关系判定问题. The millionaires' problem is an important problem in secure multiparty computation and a basic building block of secure multiparty computation protocols. Secure vector dominance statistic problem is a problem generalized for the millionaires'problem, which can be used to get the number of yi 〉 xi without leaking further information. In this paper, we first propose an encoding scheme to encode private numbers; then based the new encoding scheme and homomorphic encryption scheme, we design a protocol for millionaires'problem and prove that the protocol is secure in the semi-honest model using the simulation paradigm. Then, we utilize this scheme to propose a solution to secure vector dominance statistic problem. The performance analysis indicates that our protocol is simpler and more efficient than the others. Finally, we use the scheme to solve the integer division problem and privately determine the relation between point and lines.
作者 李顺东 左祥建 杨晓莉 巩林明 LI Shun-dong ZUO Xiang-jian YANG Xiao-li GONG Lin-ming(School of Computer Science, Shaanxi Normal University,Xi' an, Shaanxi 710119, China)
出处 《电子学报》 EI CAS CSCD 北大核心 2017年第5期1117-1123,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.61272435) 陕西师范大学研究生培养创新基金(No.2015CX029)
关键词 安全多方计算 百万富翁问题 同态加密 向量优势统计 secure multi-party computation millionaires'problem homomorphic encryption vector dominance statistic problem
  • 相关文献

参考文献4

二级参考文献57

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 3秦波,秦慧,周克复,王晓峰,王育民.常数复杂性的百万富翁协议[J].西安理工大学学报,2005,21(2):149-152. 被引量:13
  • 4A Yao.Protocols for secure computation.Proceeding of the 23th IEEE Symposium on Foundations of Computer Science.Los Alamitos,CA:IEEE Computer Society Press,1982.160-164.
  • 5C Cachin.Efficient private bidding and auctions with an oblivious third party.Proceedings of the 6th ACM Conference on Computer and Communications Security.New York:ACM Press,1999.120-127.
  • 6H Y Lin,W G Tzeng.An efficient solution to the millionaires problem based on homomorphic Encryption.Proceedings of the 4th International Conference on Applied Cryptography and Networks Security.New York:Springer-Verlag,2005.456-466.
  • 7R Fagin,M Naor,P Winkler.Comparing information without leaking it[J].Communications of the ACM,1996,39(5):77-85.
  • 8I Ioannidis,A Grama.An efficient protocol for Yao's millionaires' problem.In Proceedings of the 36th Annual Hawaii International Conference on System Sciences.Los Alamitos:IEEE Computer Society Press,2003.205.
  • 9Shundong Li,Daoshun Wang,Yiqi Dai,Ping Luo.Symmetric cryptographic solution to yao's millionaires' problem and an evaluation of secure multiparty computations[J].Information Sciences.2008,178(1):244-255.
  • 10O Goldreich,S Micali,A Wigderson.How to play any mental game.In Proceedings of the 19th Annual ACM Conference on Theory of Computing.New York:ACM,1987.218-229.

共引文献95

同被引文献21

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部