期刊文献+

面向隐私保护的非聚合式数据共享综述 被引量:9

Survey on privacy protection in non-aggregated data sharing
下载PDF
导出
摘要 海量数据价值虽高但与用户隐私关联也十分密切,以高效安全地共享多方数据且避免隐私泄露为目标,介绍了非聚合式数据共享领域的研究发展。首先,简述安全多方计算及其相关技术,包括同态加密、不经意传输、秘密共享等;其次,分析联邦学习架构,从源数据节点和通信传输优化方面探讨现有研究;最后,整理对比面向隐私保护的非聚合式数据共享框架,为后续研究方案构建和运行提供支撑。此外,总结提出非聚合式数据共享领域的挑战和潜在的研究方向,如复杂多参与方场景、优化开销平衡、相关安全隐患等。 Although there is a great value hidden in the massive data,it can also easily expose user privacy.Aiming at efficiently and securely sharing data from multiple parties and avoiding leakage of user private information,the development of related research and technologies on the non-aggregated data sharing field was introduced.Firstly,secure multi-party computing and its technologies were briefly described,including homomorphic encryption,oblivious transfer,secret sharing,etc.Secondly,the federated learning architecture was analyzed from the aspects of source data nodes and transmission optimization.Finally,the existing non-aggregated data sharing frameworks were listed and compared.In addition,the challenges and future potential research directions were summarized,such as complex multi-party scenarios,the balance between optimization and cost,as well as related security risks.
作者 李尤慧子 殷昱煜 高洪皓 金一 王新珩 LI Youhuizi;YIN Yuyu;GAO Honghao;JIN Yi;WANG Xinheng(School of Computer Science,Hangzhou Dianzi University,Hangzhou 310018,China;School of Computer Engineering and Science,Shanghai University,Shanghai 200444,China;Department of Computer Engineering,Gachon University,Seongnam 461701,South Korea;School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China;Department of Electrical and Electronic Engineering,Xi'an Jiaotong-Liverpool University,Suzhou 215123,China)
出处 《通信学报》 EI CSCD 北大核心 2021年第6期195-212,共18页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2020YFB2103805) 国家自然科学基金资助项目(No.61802093,No.61972358)。
关键词 隐私保护 数据共享 联邦学习 安全多方计算 privacy protection data sharing federated learning secure multi-party computation
  • 相关文献

参考文献5

二级参考文献17

  • 1Rabin M O. How to exchange secrets by oblivious transfer, tech- nical report TR-81 [R]. Aiken Computation Laboratory, Har- vard University, 1981.
  • 2Even S, Goldreich O, Lempel A. A randomized protocol for sig- ning contracts [J]. Communications of the ACM, 1985,28: 637- 647.
  • 3Tzeng W-G. Effeient 1-Out-of-n oblivious transfer schemes with universally usable parameters [J]. IEEE Trans. Computers, 2004,53(2) :232-240.
  • 4Qin Jing, Zhao Hua-wei. k out of n Oblivious Transfer Protocols from Bilinear Pairings[J]. Journal of Software, 2010, 1 (5) : 65- 72.
  • 5Chang C C, Lee J S. Robust t-out-of-n oblivious transfer mecha- nism based on CRT [J]. Journal of Network and Computer Ap- plications, 2009,32 (1) : 226-235.
  • 6Huang H F, Chang C C. A new design for efficient t-out-n obli- vious transfer scheme[C]ANIA 2005. 2005:28-30.
  • 7Yi Mu,Zhang Jumqi, Vijay Varadharajan. m out of n oblivious transfer[C]// ACISP2002, LNCS 2384. Springer Verlag, 2002: 395-405.
  • 8Camenisch J, Dubovitskaya M, Neven G. Oblivious Transfer with Hidden Access Control Policies [C]///PKC 2011, LNCS 6571. Springer press, 2011 : 192-209.
  • 9Huang H, Chang C C. A new t-out-n oblivious transfer with low bandwidth [J]. Applied Mathematical Sciences, 2007,1 (7) : 311- 320.
  • 10Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Advances in Cryptology-Crypto 2001, LNCS 2442. Springer press, 2002 : 354-369.

共引文献21

同被引文献72

引证文献9

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部