共查询到17条相似文献,搜索用时 218 毫秒
1.
2.
本文研究了有理数与有理区间的位置关系以及两个有理区间位置关系的安全多方计算.它们已广泛应用于数据库匹配、定位搜索等领域,是保密科学计算的一个重要分支.但目前已有文献在解决有理数与有理区间的位置关系时提出的协议效率较低,且两个有理区间位置关系问题的研究较为有限.针对这些问题,本文首先用多项式表示区间,将有理数与有理区间位置关系问题转化为整数向量的内积符号判定问题,设计了新的有理数与有理区间的保密计算协议.其次,以有理数与有理区间协议作为基础模块,设计了两个有理区间位置关系的保密计算协议.最后,理论分析及实验结果均表明本文方案是安全高效的,并给出了本文协议在有理数域上的百万富翁问题及计算几何问题的应用. 相似文献
3.
4.
目前,关于几何图形的相似问题仅限于多边形的相似,而一般几何图形相似的问题还没有研究.本文利用单向散列函数首先设计了保密判断两个数是否相等的协议、保密矩阵和向量是否相等的协议;最终,利用矩阵和向量相等的协议设计了保密判断图形是否同构和图形是否相似的协议.给出了以上协议的安全性证明、仿真实验与效率分析,实验数据表明本文保密的图形相似判定协议效率是两个多边形相似协议效率的889倍.图形相似的保密判定问题是一个全新的安全多方计算几何问题,本文研究成果可应用在分子生物学、机械工程和地形匹配等领域. 相似文献
5.
6.
安全多方计算(MPC)是密码学的一个重要研究方向.保密计算第k小元素是一个重要的MPC问题(简称k-min问题).k-min值MPC协议在保密的投票选举,保密的招投标以及保密的数据统计分析等方面具有广泛应用.目前k-min问题的MPC解决方案大都需要多次调用保密求和协议以及比较协议,协议效率较低.也有一些协议基于移动网络通信应用设计,无法解决MPC应用问题.本文提出新的编码方式,以此为基础并结合Lifted ElGamal门限密码系统设计了简单高效的k-min值MPC协议,应用模拟范例严格证明了协议的安全性,并利用实验证明了方案的可行性.以k-min协议为基础进一步设计了多方成绩保密统计与排序协议.理论分析和实验测试表明本文协议是安全且简单高效的. 相似文献
7.
安全多方计算(MPC)是密码学的一个重要研究方向.保密计算第k小元素是一个重要的MPC问题(简称k-min问题).k-min值MPC协议在保密的投票选举,保密的招投标以及保密的数据统计分析等方面具有广泛应用.目前k-min问题的MPC解决方案大都需要多次调用保密求和协议以及比较协议,协议效率较低.也有一些协议基于移动网络通信应用设计,无法解决MPC应用问题.本文提出新的编码方式,以此为基础并结合Lifted ElGamal门限密码系统设计了简单高效的k-min值MPC协议,应用模拟范例严格证明了协议的安全性,并利用实验证明了方案的可行性.以k-min协议为基础进一步设计了多方成绩保密统计与排序协议.理论分析和实验测试表明本文协议是安全且简单高效的. 相似文献
8.
9.
10.
基于同态加密的高效多方保密计算 总被引:1,自引:0,他引:1
多方保密计算是信息社会隐私保护的核心技术,是国际密码学界的研究热点之一.本文首先提出了一种新的对保密数据进行编码的方案,接着利用这种新的编码方案和同态加密方案,构造了一个百万富翁问题新的解决方案,并证明了方案的安全性.新的方案更简洁、更具有普遍意义,能够对可定义全序关系的任意两个对象进行比较.最后用这个新的解决方案解决了另一个新的多方保密计算问题-两个整数的互素问题,证明了方案是安全的. 相似文献
11.
Secure multiparty computation (SMC) is a research focusing in the international cryptographic com-munity. The protocols used to address the millionaires' problem are the basic building blocks of most SMC proto-cols and their efficiency dominates that of many other SMC protocols. To the best of our knowledge, almost all proto-cols used to address the millionaires' problem are based on integers, which means that their applications are lim-ited. In this study, we propose precise and efficient proto-cols for rational numbers based on additively homomorphic encryptions. One of our protocols is inspired by computa-tional geometry and it reduces the millionaires' problem to computing the area of a triangle formed by three private points. This approach can determine whether the relation-ship between two private inputs is greater than, equal to or less than, and it has a much lower computational complex-ity compared with existing methods. We proved that these protocols are secure using simulation paradigm. Our ap-proaches can be used in many SMC protocols that involve rational numbers and integers, and they can also be used directly to solve some secure multiparty computational ge-ometry problem in rational number field. 相似文献
12.
13.
集合成员关系的安全多方计算在保密数据挖掘和保密数据查询等方面有着重要的应用价值.针对以往方案在集合规模较大时的低效问题,本文将原问题转化成多项式一次性求值问题,在此基础上共设计了四个协议.利用同态加密设计了平凡协议1;利用离散对数设计了高效协议2,此协议非常简洁.最后,针对不同的应用场景又分别设计了云计算环境下外包用户计算的协议3和抗抵赖环境下可公开保密判定的协议4.通过分析和比较显示,我们的方案除了集合的势,其余任何信息都没有泄露,并且在集合规模较大时,相比以往方案高效而简洁. 相似文献
14.
15.
Huimin Zhao Wenguo Wei Jun Cai Fangyuan Lei Jianzhen Luo 《Multidimensional Systems and Signal Processing》2016,27(4):891-908
In this paper, a novel scheme is proposed for multi-sourced signal fusion and secure processing. Within a distributed compressed sensing (DCS) framework, traditional sampling, compression and encryption for signal acquisition are unified under the secure multiparty computation protocol. In the proposed scheme, generation of the pseudo-random sensing matrix offers a natural method for data encryption in DCS, allowing for joint recovery of multiparty data at legal users’ side. Experimental analysis and results indicate that the secure signal processing and recovery in DCS domain is feasible, and requires fewer measurements than the achievable approach of separate CS and Nyquist processing. The proposed scheme can be also extended to other cloud-based collaborative secure signal processing and data-mining applications. 相似文献
16.
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose a secure data sharing scheme in OSNs based on ciphertext-policy attributebased proxy re-encryption and secret sharing.In order to protect users' sensitive data,our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider.Our scheme presents a multiparty access control model,which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy.Further,we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider.We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext.Moreover,our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy.The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 相似文献