期刊文献+

集合交集问题的安全计算 被引量:2

A Secure Multiparty Intersection Computation
下载PDF
导出
摘要 安全多方计算是隐私保护的核心技术,也是密码学研究的热点.由于生活中很多问题可转化为对集合的运算,因此集合是安全多方计算研究的重要内容.现有对集合的运算包括保密计算集合的交(并)集、保密计算集合的势、保密判定元素与集合的关系、保密判定集合包含等.本文主要利用保密替换、加密选择、密码系统的加法同态性研究了三个新问题,分别为集合交(并)集的势与阈值关系的保密判定、元素与集合交(并)集关系的保密判定、集合与集合交(并)集关系的保密判定.首先,在数据范围已知情况下,将数据转化为数组进行计算,在计算过程中不泄露集合的交(并)集,只得到最终结果.同时,利用lifted ElGamal门限密码系统设计出抗合谋的安全协议.最后,利用模拟范例对协议的安全性进行证明. Secure multi-party computation is not only a core privacy preserving technology,it is also a hot issue in the international cryptographic community.Set operation is a significant problem of secure multi-party computation because many problems can be transformed to set operation problems.The existing secure set operation solutions include secure intersection(union)computation,secure intersection cardinality computation,secure determination of the relationship between an element and a set,secure set inclusion determination etc.This paper addresses three new problems by using private substitution,encryption selection and additive homomorphism of encryption system.These problems can be used to securely determine the relationship between a threshold and the cardinality of intersection(union)of private sets,securely determine the relationship between an element and the intersection(union)of private sets,and securely determine the relationship between a set and the intersection(union)of private sets.When the data range is known,the data is encoded to an array to perform secure computation without disclosing the intersection(union)of the private sets.Meanwhile,the threshold lifted ElGamal cryptosystem can be used to resist collusion attacks.It is proved that,by using the simulation paradigm,the designed protocols are secure in the semi-honest model.
作者 赵雪玲 家珠亮 李顺东 ZHAO Xue-Ling;JIA Zhu-Liang;LI Shun-Dong(School of Computer Science,Shaanxi Normal University,Xi’an 710119,China)
出处 《密码学报》 CSCD 2022年第2期294-307,共14页 Journal of Cryptologic Research
基金 国家自然科学基金(61272435)。
关键词 安全多方计算 集合交集 保密替换 加密选择 liftedElGamal secure multi-party compution set intersection private substitution encryption selection lifted ElGamal
  • 相关文献

参考文献5

二级参考文献21

  • 1秦静,张振峰,冯登国,李宝.一个特殊的安全双方计算协议[J].通信学报,2004,25(11):35-42. 被引量:10
  • 2罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 3李顺东,窦家维,贾晓林.集合相交问题的双方保密计算[J].西安交通大学学报,2006,40(10):1091-1093. 被引量:4
  • 4罗永龙,黄刘生,荆巍巍,徐维江,陈国良.保护私有信息的叉积协议及其应用[J].计算机学报,2007,30(2):248-254. 被引量:30
  • 5Naor M,Pinkas B.Oblivious Transfer and Polynomial Evaluation. Proceeding of the 31st Annual ACMSymposium on Theory of Computing . 1999
  • 6Goldreich O.Foundations of Cryptography:Basic Applications. . 2004
  • 7Atallah M J,Du Wenliang.Secure multi-party computational geometry. Proceedings of 7th International Workshop on Algorithms and Data Structures(WADS 2001) . 2001
  • 8Dan Bogdanov,Margus Niitsoo,Tomas Toft,Jan Willemson.??High-performance secure multi-party computation for data mining applications(J)International Journal of Information Security . 2012 (6)
  • 9Li Shundong,Wu Chunying,Wang Daoshun,Dai Yiqi.??Secure multiparty computation of solid geometric problems and their applications(J)Information Sciences . 2014
  • 10Shlomi Dolev,Niv Gilboa,Marina Kopeetsky.??Efficient private multi-party computations of trust in the presence of curious and malicious users(J)Journal of Trust Management . 2014 (1)

共引文献32

同被引文献19

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部