期刊文献+

有理数相等的保密判定 被引量:4

Privately Determining Equality of Rational Numbers
在线阅读 下载PDF
导出
摘要 安全多方计算是近年来国际密码学界研究的热点.数据相等保密判定是安全多方计算的一个基本问题,在指纹匹配和关键词搜索等现实问题中有广泛的应用,因此研究数据相等保密判定有重要的理论与实际意义.本文协议I利用Paillier加密算法高效实现了两个有理数相等的保密判定,协议II基于椭圆曲线同态加密算法安全高效计算多个有理数相等判定问题,并且最后给出了恶意模型下的有理数相等保密判定协议. Secure multiparty computation(SMC)has become research focus in the international cryptographic community in recent years.Privately determining equality of data is a basic problem in SMC.It is widely applied to fingerprint matching,keyword searching and so on.Studying privately determining equality of data has important theoretical and practical significance.Protocol I which is based on the Paillier cryptosystem can privately determine equality of two rational numbers.ProtocolⅡwhich is based on elliptic curve cryptosytem can privately determine equality of multiple rational numbers.Finally this paper gives the protocol for privately determining equality of rational numbers in the malicious model.
作者 李顺东 杜润萌 杨颜璟 魏琼 LI Shun-dong;DU Run-meng;YANG Yan-jing;WEI Qiong(School of Computer Science,Shaanxi Normal University,Xi'an,Shaanxi 710062,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2020年第10期1933-1937,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.61272435)。
关键词 密码学 安全多方计算 数据相等 有理数 指纹匹配 cryptography secure multiparty computation data equality rational number fingerprint matching
作者简介 李顺东,男,1963年生于河南.现为陕西师范大学计算机科学学院博士生导师.主要研究方向为现代密码学与信息安全.E-mail:shundong@snnu.edu.cn;杜润萌,女,1994年生于山西.现为陕西师范大学计算机科学学院硕士研究生.主要研究方向为现代密码学与信息安全.E-mail:durunmeng@snnu.edu.cn。
  • 相关文献

参考文献4

二级参考文献30

  • 1李顺东,王道顺,戴一奇,罗平.两个集合相等的多方保密计算[J].中国科学(F辑:信息科学),2009,39(3):305-310. 被引量:5
  • 2李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 3秦波,秦慧,周克复,王晓峰,王育民.常数复杂性的百万富翁协议[J].西安理工大学学报,2005,21(2):149-152. 被引量:13
  • 4Yao A. Protocols for secure computation[ A]. Proceeding of the 23th IEEE Symposium on Foundations of Computer Science [C]. Los Alamitos, CA: 1EEE Computer Society Press, 1982. 160- 164.
  • 5Cachin C. Efficient private bidding and auctions with an oblivi- ous third party[ A] .Proceedings of the 6th ACM Conference on Computer and Communications Security[ C ]. New York: ACM Press, 1999.120 - 127.
  • 6Lin H Y, Tzeng W G. An efficient solution to the millionaires problem based on homomorphic Encrypfion[ A]. Proceedings of the 4th International Conference on Applied Cryptography and Networks Security[ C] .New York: 2005.456 - 466.
  • 7Fagin R, Naor M, Winkler P. Comparing information without leaking it[ J ]. Communications of the A CM, 1996,39(5 ) : 77 - 85.
  • 8Ioannidis I,Grama A.An efficient protocol for Yao's million- aires' problem[ A]. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences [ C]. Hawaii: 2003.
  • 9Li S D,Wang D S,Dai Y Q,Luo P. Symmetric cryptographic solution to Yao's Milh'onaires' problem and an evaluation of secure multiparty computafions[ J]. Information Sciences. 2008, 178: 244 - 255.
  • 10Goldreich O, Micali S, Wigderson A. How to play any mental game[ A] .In Proceedings of the 19th Annual ACM Conference on Theory of Computing[ C]. New York: ACM, 1987. 218 - 229.

共引文献46

同被引文献28

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部