多方保密计算中基础协议及其应用研究
[Abstract]:The problem of information security is one of the greatest threats in the information society. As an important tool to solve the problem of information security, multi-party confidential computing has attracted great attention. Multi-party secure computing refers to two or more users who have secret input and hope to cooperate in carrying out a certain computing task without revealing their private information. It is widely used in scientific calculation geometric calculation and so on. In this paper, two basic problems in scientific computation and geometric computation are studied in depth, and some protocols applied in specific fields are designed. Firstly, the norm problem of vector difference is studied. Based on homomorphic encryption technique and secure two-party permutation technique, the norm protocol for secret computation of vector difference is designed, because this protocol is not suitable for two-dimensional vector. Therefore, based on the idea of inner product protocol constructed by Clifton, another norm protocol for secret computation of vector difference is designed. Secondly, the millionaire problem is studied, and the existing solutions to the problem are summarized and analyzed. Then, a new millionaire protocol based on data camouflage and homomorphic encryption algorithm is proposed. Compared with the previous schemes, the two schemes in this paper reduce the number of encryption and decryption and the total number of modular multiplication and modular power operations, and improve the efficiency of the scheme. Finally, based on the norm protocol of vector difference, two application problems are solved, namely, the problem of secure computation of parallelogram area in high-dimensional space and the problem of corresponding proportion of data, and the problem based on millionaire protocol. Three application problems are solved, namely, vector dominant statistics problem, two rectangular position relation decision problem and integral division problem. The corresponding protocol is designed, and the correctness analysis, security proof and efficiency analysis of the protocol are carried out. The comparison and analysis show that the protocol is more secure and efficient.
【学位授予单位】:西安科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【参考文献】
相关期刊论文 前10条
1 钱小强;仲红;石润华;;无茫然第三方的安全两方向量优势统计协议[J];计算机工程;2014年02期
2 李顺东;王道顺;;基于同态加密的高效多方保密计算[J];电子学报;2013年04期
3 杨高明;杨静;张健沛;;聚类的(α,k)-匿名数据发布[J];电子学报;2011年08期
4 赵玉;仲红;易磊;;安全判定两组数据对应成比例的新方法[J];微型机与应用;2011年13期
5 刘文;罗守山;王永滨;;安全两方向量优势统计协议及其应用[J];电子学报;2010年11期
6 查俊;苏锦海;闫少阁;闫晓芳;;姚氏百万富翁问题的高效解决方案[J];计算机工程;2010年14期
7 鲁磊纪;黄宏升;方治;;隐私保护的计算三角形面积协议[J];电脑知识与技术;2009年33期
8 罗永龙;黄刘生;徐维江;荆巍巍;;一个保护私有信息的多边形相交判定协议[J];电子学报;2007年04期
9 刘木兰;;密钥共享体制与安全多方计算[J];北京电子科技学院学报;2006年04期
10 罗永龙;黄刘生;荆巍巍;徐维江;;空间几何对象相对位置判定中的私有信息保护[J];计算机研究与发展;2006年03期
相关博士学位论文 前3条
1 孙茂华;安全多方计算及其应用研究[D];北京邮电大学;2013年
2 刘文;几类特殊的安全多方计算问题的研究[D];北京邮电大学;2009年
3 荆巍巍;安全多方计算中若干基础协议及应用的研究[D];中国科学技术大学;2008年
相关硕士学位论文 前3条
1 谢娟;不经意传输协议的研究与应用[D];苏州大学;2010年
2 邱梅;安全多方排序协议的研究[D];北京邮电大学;2009年
3 陈杰;安全多方计算问题的研究[D];贵州大学;2006年
,本文编号:2289239
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2289239.html