期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Effective Security Comparison Protocol in Cloud Computing
1
作者 Yuling Chen Junhong Tao +2 位作者 Tao Li Jiangyuan Cai Xiaojun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第6期5141-5158,共18页
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses ... With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data. 展开更多
关键词 Secure comparison protocols zero-knowledge proof homomorphic encryption cloud computing
下载PDF
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:4
2
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity 被引量:2
3
作者 Liang Xue Dongxiao Liu +2 位作者 Cheng Huang Xiaodong Lin Xuemin(Sherman)Shen 《Journal of Communications and Information Networks》 CSCD 2020年第1期16-25,共10页
As a widely-used machine-learning classifier,a decision tree model can be trained and deployed at a service provider to provide classification services for clients,e.g.,remote diagnostics.To address privacy concerns r... As a widely-used machine-learning classifier,a decision tree model can be trained and deployed at a service provider to provide classification services for clients,e.g.,remote diagnostics.To address privacy concerns regarding the sensitive information in these services(i.e.,the clients’inputs,model parameters,and classification results),we propose a privacy-preserving decision tree classification scheme(PDTC)in this paper.Specifically,we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol,where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner.Then,based on the comparison protocol,we exploit the structure of the decision tree to construct PDTC,where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client.A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties.In addition,performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes. 展开更多
关键词 decision trees data privacy model privacy secure comparison machine-learning classification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部