[1]杨晓艺,刘新,亢佳. 点包含问题的安全多方计算[J].计算机技术与发展,2017,27(05):120-122.
 YANG Xiao-yi,LIU Xin,KANG Jia. Secure Multi-party Computation for Point Inclusion Problems[J].,2017,27(05):120-122.
点击复制

 点包含问题的安全多方计算()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年05期
页码:
120-122
栏目:
安全与防范
出版日期:
2017-05-10

文章信息/Info

Title:
 Secure Multi-party Computation for Point Inclusion Problems
文章编号:
1673-629X(2017)05-0120-03
作者:
 杨晓艺刘新亢佳
 陕西师范大学 计算机科学学院
Author(s):
 YANG Xiao-yiLIU XinKANG Jia
关键词:
 安全多方计算保密计算几何点包含问题 线段相交问题
Keywords:
 secure multi-party computationcomputational geometrypoint-inclusion problemsegment-intersection problem
分类号:
TP31
文献标志码:
A
摘要:
 安全多方计算是近年来国际密码学界研究的热点问题,计算几何的多方保密计算越来越受到重视,点包含问题的多方保密计算作为保密计算几何中的一个重要问题也越来越受到关注.考虑到要保密地解决点包含的问题,基于安全多方计算的几个基础协议,即向量点积协议和姚式百万富翁协议,设计了一个可以保密判断线段是否相交的协议,基于此协议的核心思想同时联系相关几何知识,设计了可以保密判断点包含问题的协议,理论分析结果表明所设计的协议在半诚实模型下是正确的和安全的.它们作为重要的安全多方计算基础协议对解决保密计算几何其他相关问题有着重要的实用价值,可以用来进一步解决两个或多个图形是否相交的问题、多个点是否包含在一个图形中的问题等.
Abstract:
 Secure multi-party computation is one of the hot spots in international cryptography research community in recent years,and more and more attention has been paid to the secure computational geometry.As an important problem of secure computational geometry,more interests have been paid on point-inclusion problem.A secure protocol for determining whether two segments are intersecting with several basic protocols,Scalar Product Protocol and Yao’s Millionaire’s Protocol,has been developed.Thus based on core of the protocol designed and related geometric knowledge,a secure protocol to solve the point-inclusion problem has been developed.Theoretical analysis results show that these two protocols are correct and secure under semi honest model.As a part of important secure multi-party computational protocols,they both imply important practical value in solving the problem of secure multi-party computational geometry and can be used to solve the problems,whether two or more graphics are intersected and whether multiple points are contained in a graphic etc..

相似文献/References:

[1]石磊 罗永龙 张彩云.随机化算法及其在最小外接圆求解中的应用[J].计算机技术与发展,2009,(08):82.
 SHI Lei,LUO Yong-long,ZHANG Cai-yun.Randomized Algorithm and Its Application in Finding Minimum Circumscribed Circle[J].,2009,(05):82.
[2]赵晓孔 罗永龙 程超 周正珍.一种基于反馈的信任生成算法[J].计算机技术与发展,2010,(12):166.
 ZHAO Xiao-kong,LUO Yong-long,CHENG Chao,et al.A Trust Generating Algorithm Based on Feedback[J].,2010,(05):166.
[3]赵玉 易磊.空间几何对象相对位置的新安全判定方法[J].计算机技术与发展,2011,(05):103.
 ZHAO Yu,YI Lei.A New Secure Method for Determining Two Spatial Geometric Objects Related Position[J].,2011,(05):103.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[7]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[8]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[9]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[10]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[11]杨晓莉,左祥建. 一种基于二次剩余的抛掷硬币方案[J].计算机技术与发展,2016,26(09):139.
 YANG Xiao-li,ZUO Xiang-jian. A Coin Toss Protocol Based on Quadratic Residue[J].,2016,26(05):139.

更新日期/Last Update: 2017-07-07