期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Protocol for a Private Set-Operation
1
作者 李荣花 武传坤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期822-829,共8页
A new private set-operation problem is proposed. Suppose there are n parties with each owning a secret set. Let one of them, say P, be the leader, S be P's secret set, and t (less than n - 1) be a threshold value. ... A new private set-operation problem is proposed. Suppose there are n parties with each owning a secret set. Let one of them, say P, be the leader, S be P's secret set, and t (less than n - 1) be a threshold value. For each element w of S, if w appears more than t times in the rest parties' sets, then P learns which parties' sets include w, otherwise P cannot know whether w appears in any party's set. For this problem, a secure protocol is proposed in the semi-honest model based on semantically secure homomorphic encryption scheme, secure sharing scheme, and the polynomial representation of sets. The protocol only needs constant rounds of communication. 展开更多
关键词 secure multiparty computation private set-operation secure protocol
原文传递
基于解释学习的可操作性 被引量:1
2
作者 石纯一 邹晨东 《计算机学报》 EI CSCD 北大核心 1993年第11期801-806,共6页
可操作性是基于解释机器学习(EBL)的关键问题,本文给出了一种以模糊集理论来描述可操作性的方法,建立了EBL的模型,这一结果,优于Keller等人的工作。
关键词 解释学习 可操作性
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部