首页 | 官方网站   微博 | 高级检索  
     

秘密区间与阈值的保密判定
引用本文:成雯,李顺东,王文丽.秘密区间与阈值的保密判定[J].计算机科学与探索,2020,14(5):760-768.
作者姓名:成雯  李顺东  王文丽
作者单位:陕西师范大学 计算机科学学院,西安 710119;陕西师范大学 数学与信息科学学院,西安 710119
基金项目:国家自然科学基金No.61272435。
摘    要:安全多方计算(SMC)是密码学领域近年来的研究热点,是信息安全保护的关键技术。区间安全多方计算问题在密码学中具有重要的理论意义。之前的研究很少涉及到秘密区间,即区间是由两方或多方合作生成的,任何人对区间信息一无所知。秘密区间问题在现实生活中有很重要的实际意义。主要研究的是秘密区间与阈值的保密判定问题,针对两方合作生成秘密区间,基于Paillier同态加密算法设计了一个协议;针对多方合作生成秘密区间,利用编码原理并结合Lifted ElGamal同态加密算法,提出了优化协议。所设计的安全多方计算协议均能抵抗合谋攻击,并利用模拟范例证明了协议的安全性。利用所设计的协议可以解决很多实际应用问题。

关 键 词:安全多方计算  秘密区间与阈值  同态加密  门限解密

Privacy-Preserving Determination of Secret Interval and Threshold
CHENG Wen,LI Shundong,WANG Wenli.Privacy-Preserving Determination of Secret Interval and Threshold[J].Journal of Frontier of Computer Science and Technology,2020,14(5):760-768.
Authors:CHENG Wen  LI Shundong  WANG Wenli
Affiliation:(School of Computer Science,Shaanxi Normal University,Xi’an 710119,China;School of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710119,China)
Abstract:Secure multi-party computation(SMC) is a research hotspot in cryptography in recent years, and is also a key technology for information security protection. The interval secure multi-party computation problems have important theoretical significance in cryptography. Previous studies rarely involve secret interval, that is, interval is generated by two-party or multi-party, and any one knows nothing about the interval information. The secret interval problems have important practical significance in real life. This paper mainly studies the privacy-preserving determination of secret interval and threshold. Firstly, for the secret interval is generated by two-party, based on Paillier’s homomorphic encryption, this paper proposes a protocol. Secondly, for the secret interval is generated by multi-party, this paper proposes an optimization protocol that uses the coding principle combined with Lifted ElGamal homomorphic encryption. Thirdly, this paper proves the protocols can resist collusion attacks, and proves they are safe by using the simulation paradigm. Finally, many practical application problems can be solved by using the protocols proposed in this paper.
Keywords:secure multi-party computation  secret interval and threshold  homomorphic encryption  threshold decryption
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号