期刊文献+

三点共线的保密判断问题及应用 被引量:3

Privately Determining Protocol on Three Points Are Collinear and Its Applications
下载PDF
导出
摘要 安全多方计算问题由图灵奖得主姚期智于上世纪八十年代首先提出,现在已经成为密码学的一个重要研究方向.保护隐私的计算几何是一类特殊的安全多方计算问题,它是指在一个互不信任的多用户网络中,用户输入各自的几何信息共同完成某项计算任务,但不能泄露各自的输入信息.该问题在商业和军事等领域有着非常重要的应用前景.三点共线的保密判定问题是一个很新颖的问题,目前尚未得到解决.在本文的研究中,我们利用paillier同态加密算法,设计了保护私有信息的三点共线判定问题协议,证明了协议的正确性,并用模拟范例证明了协议的安全性.本文利用三点共线判定问题协议作为基本模块,设计了点与线段关系判定问题协议,证明了该协议的安全性与正确性.我们还给出了以上协议的计算复杂性和通信复杂性分析.在本文的最后部分,结合三点共线判定问题协议和点与线段关系判定问题协议,我们给出了保密计算工业中化学混合物按比例的兑制问题的应用实例. Secure Multi-party Computation was first proposed by A. C. Yao in 1980s. Now, it is a new and important area of cryptography. Privacy preserving computational geometry is a kind of secure multi-party computation problem. In this scenario, some users who do not trust each other want to cooperatively perform computing on their private geometrical data while keeping the privacy of the data. This problem has important application prospect in commerce and military. There is a new problem that three participants want to know whether their positions are collinear or not without disclosing their specific positions. This problem has not been solved. In this study, we propose a protocol for the problem based on Paillier’s homomorphic encryption scheme. We prove the validity of the protocol, we also prove that the protocol is secure in the semi-honest model using the simulation paradigm. We utilize this scheme to propose a solution to privately determining the relationship of points and line-segments. We prove that these protocols are secure using the simulation paradigm, and analyze their performance. At last, we show an application of these two protocols in chemical industry.
出处 《密码学报》 CSCD 2016年第3期238-248,共11页 Journal of Cryptologic Research
基金 国家自然科学基金资助项目(61272435) 研究生培养创新基金(2015CX029)
关键词 多方保密计算 计算几何 同态加密 协议 secure multi-party computation computational geometry homomorphic encryption protocol
  • 相关文献

参考文献4

二级参考文献19

  • 1罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 2O. Gotdreich. Secure multl-party computation (manuscript version 1.3). http ://theory. lcs. mit. edu/- oded, 2002.
  • 3A. C. Yao. Protocols for secure computations. In: Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science.Los Alamitos: IEEE Computer Society Press, 1982. 160 - 164.
  • 4C. Cachin. Efficient private bidding and auctions with an oblivious third party. In: Proe. 6th ACM Conf. Computer and Communications Security. New York: ACM Press, 1999. 120-127.
  • 5A. C. Yao. How to generate and exchange secrets. In; Proe.27th IEEE Symposium on Foundations of Computer Science, Los Alamitos: IEEE Computer Society Press, 1986. 162- 167.
  • 6O. Goldreich, S. Micali, A. Wigderson. How to play any mental game. In: Prec. 19th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 1987. 218-229.
  • 7S. Goldwasser. Multi-party computations: Past and present, In:Proc. 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997. 1 -6.
  • 8Mikhail J. Atallah, Wenliang Du. Secure muhi-party computational geometry. In: Lecture Notes in Computer Science 2125. Berlin: Springer, 2001. 165-179.
  • 9J.Vaidya,C.Clifton.Privacy preserving association rule mining in vertically partitioncd data.In:Proc.8th ACM SIGKDD Int'l Conf.Knowledge Discovery and Data Mining.New York:ACM Press,2002.639-644.
  • 10I. Ioannidis, A. Grama, M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments,In:Proc.2002 Int'l Conf.Paralel Processing.Los Alamitios:IEEE Computer Society Press,2002.379-384.

共引文献58

同被引文献16

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部