期刊文献+

隐私保护的计算三角形面积协议 被引量:1

A Privacy-preserving Protocol on Calculating the Area of Triangle
下载PDF
导出
摘要 在保护隐私的条件下,目前已有的计算面积协议都是两方。该文提出了两个基于同态加密的三方计算三角形面积协议,并对这两个协议的安全性和计算复杂度进行了分析。协议中三个参与方各自拥有一个点,共同计算出参与方拥有的点所围成的三角形的面积,同时确保不泄漏自己的私有信息。 Under the condition of privacy preserved, existing protocols on calculating area are executed by two-party. Based on homomorphic encryption, two protocols are proposed which is used to solve the problem of calculating the area of triangle by three-party. The security and computational complexity of two protocols are as well analyzed. Each of three-party has one point and they want to cooperatively calculate the triangle which is formed by their points without bringing risk to private information.
出处 《电脑知识与技术》 2009年第11X期9168-9170,共3页 Computer Knowledge and Technology
关键词 保护隐私 同态加密 计算几何 三角形 privacy-preserving homomorphic encryption computational geometry triangle
  • 相关文献

参考文献4

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2DAS A S,,SRINATHAN K.Privacy Preserving Cooperative Clustering Service[].Advanced Computing and Communications.2007
  • 3M. J. Atallah,and W. Du.Secure Multi-Party Computational Geometry. Proceedings of 7th International Workshop on Algorithms and Data Structures. (WADS 2001) . August,8-102001
  • 4Du W,Atallah M J.Secure multi-party computation problems and their applications: A review and open problems. New Security Paradigms Workshop 2001 . September11-132001

二级参考文献16

  • 1Wenliang Du, Mikhail J Atallah. Secure multi-partycomputation problems and their applications: A reviewand open problems. In New Security Paradigms Work-shop 2001,September 11-13, 2001, Cloudcroft, NewMexico,USA., pp.11-20. Available at http://www.cis.syr.edu/ wedu/Research/publication.ht ml.
  • 2Mikhail J Atallah, Wenliang Du. Secure multi-party compu-tational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179.
  • 3Yao A. Protocols for secure computations. In Proc. the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA., 1982,pp.160-164.
  • 4Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Conference on Theory of Computing, ACM Press, New York, 1987,pp.218-229.
  • 5Goldwasser S. Multi-party computations: Past and present.In Proc. the 16th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, 1997, pp.21-24.
  • 6Lindell Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cwptology, 2003, 16(3):143-184.
  • 7Goldreich O. Secure multi-party computation (working draft).Available at http://www.wisdom.weizmann.ac.il/home/oded/publichtml/foc.html, 2002.
  • 8Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
  • 9Rakesh Agrawal, Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. the PO00 ACM SIGMOD on Management of Data, ACM Press, New York. 2000. pp.439-450.
  • 10Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996,39(5): 77-85.

共引文献35

同被引文献17

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2Yao A C.Protocols for secure computations[C] //Proceedings of 23rd IEEE Symposium on Foundations of Computer Science,1982: 160-164.
  • 3Du W L,Atallah M J.Privacy-preserving cooperative scientific computations[C] //Proceedings of 14th IEEE Computer Security Foundations Workshop Lecture,2001: 273-282.
  • 4Agrawal R,Srikant R.Privacy-preserving data mining[C] //Proceedings of ACM International Conference on Management of Data and Symposium on Principles of Database Systems,2000:439-450.
  • 5Atallah M J,Du W L.Secure multi-party computational geometry[C] //Lecture Notes in Computer Science 2125.NY:Springer,2001:165-179.
  • 6Goldwasser.Multi-party computations: past and present[C] //Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing,1997: 1-6.
  • 7Goldreich O,Micali S,Wigderson A.How to play ANY mental game[C] //Proceedings of the 19th Annual ACM Conference on Theory of Computing,1987: 218-229.
  • 8Goldreich O.Foundations of cryptography:basic applications[M].London: Cambridge University Press,2004.
  • 9Du W L,Atallah M J.Secure multi-party computation problems and their applications: A review and open problems[C] //Proceedings of New Security Paradigms Workshop 2001,2001: 11-20.
  • 10JING Wei-wei.Research on several basic protocols and applications of secure multi-party computation[D].Hefei:University of Science and Technology of China,2008.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部