[1]亢佳,杨晓艺,刘新. 集合间基本操作的多方保密计算[J].计算机技术与发展,2017,27(08):110-114.
 KANG Jia,YANG Xiao-yi,LIU Xin. Secure Multi-party Computation of Basic Operation among Sets[J].,2017,27(08):110-114.
点击复制

 集合间基本操作的多方保密计算()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年08期
页码:
110-114
栏目:
安全与防范
出版日期:
2017-08-10

文章信息/Info

Title:
 Secure Multi-party Computation of Basic Operation among Sets
文章编号:
1673-629X(2017)08-0110-05
作者:
 亢佳杨晓艺刘新
 陕西师范大学 计算机科学学院,
Author(s):
 KANG JiaYANG Xiao-yiLIU Xin
关键词:
 多方保密计算集合交集集合并集加法同态
Keywords:
 secure multi-party computationset intersectionset unionaddition homomorphism
分类号:
TP31
文献标志码:
A
摘要:
 多方保密计算是近年来国际密码学界研究的热点问题.集合是科学研究中一个非常重要的概念,其在数学领域具有无可比拟的特殊重要性.现实生活中的许多问题可以转化成集合之间的基本操作问题来解决.对集合间的保密操作,如保密地计算集合交集、并集是多方保密计算中的一个重要方面,在保密的数据挖掘,保密的数据库查询等方面有重要的意义,在现实生活中也有广泛的应用前景和实用价值.为了解决集合之间基本操作的保密问题,提出了基于Paillier加法同态加密算法的安全两数差平方计算协议和求解集合交集的保密协议,并设计了基于百万富翁协议的求解集合并集的保密协议.理论分析表明,基于Paillier加法同态加密算法的安全两数差平方计算协议以及求解集合交集与并集的保密协议具有较好的正确性和安全性.
Abstract:
 Secure multi-party computation is a focus in international cryptographic community study in recent years.The set is a very important concept in scientific research and has an unparalleled special importance in the field of mathematics.Many problems in real life can be solved by using basic operation between sets.The private operation of sets is an important aspect on secure multi-party computation,such as problem of privately determining whether two sets are intersecting and of set union.The secure multi-party computation for basic operation between sets has most important significance on private data mining and confidential database query and also has broad application perspectives and practical value at the same time in real life.In order to solve the problems of set operation,a protocol about two difference square calculation based on the addition homomorphism of Paillier encryption algorithm is presented,which is employed to privately determine whether two sets are intersecting and designed to solve the set union problems depended on Yao’s Millionaires’ Problem.The theoretical analysis shows that the they have both high accuracy and safety.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.
[11]马丽,窦家维,吴艳梅. 抛掷硬币方案研究[J].计算机技术与发展,2017,27(04):117.
 MA Li,DOU Jia-wei,WU Yan-mei. Investigation on Tossing Coin Scheme[J].,2017,27(08):117.

更新日期/Last Update: 2017-09-21