期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks 被引量:6
1
作者 Haiping Huang Tianhe Gong +2 位作者 Ping Chen Reza Malekian Tao Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第4期385-396,共12页
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation ... Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks. 展开更多
关键词 secure two-party computation privacy-PRESERVING wireless sensor networks scalar product distancecalculation privacy homomorphism
原文传递
A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network
2
作者 HUANG Xingyang YANG Ming 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1563-1568,共6页
In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregat... In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregation will consume much more energy than common nodes and may quit the mission in advance due to energy exhausting because of taxing decryption and re-encryption operation; moreover, it will bring complex key management to ensure the security of the data and corresponding keys. This paper was designed specifically to address above problem based on the thought of privacy homomorphism, It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture. Using the simulation and analysis, we show that our scheme consume the energy only about 21% of AED scheme. 展开更多
关键词 data aggregation privacy homomorphism perfect security network clustering wireless sensor network
下载PDF
Analysis and Enhancement of a Watermarking Protocol Suitable for Web Context 被引量:1
3
作者 曾鹏 曹珍富 林煌 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期392-396,共5页
<Abstract>A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Fr... <Abstract>A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper. 展开更多
关键词 copyright protection watermarking protocol privacy homomorphism
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部