期刊文献+

多方安全矩阵乘积协议及应用 被引量:34

The Secure Multi-Party Protocol of Matrix Product and Its Application
下载PDF
导出
摘要 研究特殊的多方安全计算问题,已经成为多方安全计算研究的一个新的重要内容,美国普渡大学的Du博士在他的学位论文中,已经研究、总结了部分特殊两方安全计算问题.同时,Du博士指出如何把两方安全计算推广到多方安全计算,如何把半诚实模型推广到恶意模型是一个非常有意义的工作.该文研究了在科学计算方向上Du博士提出的几个多方安全计算问题,得到了一些结果.该文的主要结果有:给出了一个科学计算基础协议———安全多方矩阵乘积协议,应用该协议,给出了解线性方程组、计算矩阵特征值问题的多方安全计算协议. Wenliang Du has been studied some secure two-party scientific computation problems [4] : Linear systems of equations problems, Linear least squares problems and Linear programming problems. And he point to: (1)There are some other interesting scientific computation problems that need to be studied, such as how secure compute eigenvalues of matrix. (2)Extension to the secure multi-party computation problem, and thought extension secure two-party computation protocols to the secure multi-party computation protocols is not trivial. In this paper, authors disscuss two scientific computation problems: eigenvalues of matrix in secure multi-party computation situation, and give some secure multi-party scientific computation protocols.
作者 罗文俊 李祥
出处 《计算机学报》 EI CSCD 北大核心 2005年第7期1230-1235,共6页 Chinese Journal of Computers
基金 贵州省自然科学基金(20043029) 武汉大学软件工程国家重点实验室基金(SKLSE0422)资助.
关键词 多方安全计算 线性方程组 矩阵特征值 多方安全计算协议 多方矩阵乘积协议 secure multi-party computation linear system of equations eigenvalues of matrix secure multi-party computation protocol the protocol of matrix product
  • 相关文献

参考文献15

  • 1Yao A.. Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles, 1982, 160~164 被引量:1
  • 2Golderich O., Micali S., Wigderson A.. How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, 1987, 218~229 被引量:1
  • 3Lindell Y.. On the composition of secure multi-party protocols[Ph.D. dissertation]. The Weizmann Institute of Science, Israel, 2002 被引量:1
  • 4Du Wenliang. A study of several specific secure two-party computation problems[Ph.D. dissertation]. Purdue University,USA, 2000 被引量:1
  • 5Cachin C., Micali S., Stadler M.. Computationally private information retrieval with polyogarithmic communication. In: Proceedings of Eurocrypt'99, Prague, Czech Republic, 1999, 308~318 被引量:1
  • 6Chor B., Gilboa N.. Computationally private information retrieval(extended abstract). In: Proceedings of the 29th ACM Symposium on Theory of Computing, El Paso, Texas, USA, 1997, 304~313 被引量:1
  • 7Du Wenliang, Atallah M.J.. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 273~282 被引量:1
  • 8Luo Wen-Jun, Li Xiang. A study of secure multi-party statistical analysis. In: Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, 2003, 377~382 被引量:1
  • 9Luo Wen-Jun, Li Xiang. A study of secure multi-party elementary function computation protocols. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, 2004, 5~12 被引量:1
  • 10罗文俊,李祥.双向零知识证明与初等函数两方保密计算[J].贵州大学学报(自然科学版),2004,21(1):36-42. 被引量:2

二级参考文献30

  • 1卢开澄.计算机密码学:第二版[M].北京:清华大学出版社,1998.. 被引量:2
  • 2R Canetfi. Studies in Secure Multiparty Computation and Applications, Ph D Thesis, Weizmann Institiute of Science, Israel, 1995. 被引量:1
  • 3M Fitzi, N Gisin, U Maurer and O Von Rotz. Unconditional Byzantine Agreement and Multi-Party Computation Secure Against Dishonest Minorities from Scratch [ C ]. In Eurocrypt ' 02, Spfinger-Verlag ( LNCS2332 ) , pages 482-501,2002. 被引量:1
  • 4J Kilian. Founding crytography on oblivious transfer. In Proceedings of Twentieth ACM Symposium on Theory of Computing, Pages 20-31,1988. 被引量:1
  • 5Wenliang Du. A Study of Several Specific Secure Two-party Computation Problems[ C ]. PH. D Thesis. Purdue University. 2000. Available From:htttp ://www. cis. cdu/-wedu/Research/publication. html. 被引量:1
  • 6M Naor and B Pinkas. Oblivious transfer and polynomial evalutation[ C ]. In Proc. Of 31^st STOC, ACM, 1999, pp. 245-254. 被引量:1
  • 7Wenjun Luo(罗文俊),Xiang Li(李祥).A study of secure multi-party statistical analysis[C].IEEE 2003 International Conference on Computer Networks and Mobile Computing.20—23 October 2003.PP.377—382. 被引量:1
  • 8Bruce sehneier. Applied Cryptography Protocols,algorithms, and source code in C [ M ]. John and Wiley & Sons, Inc , 1966. 被引量:1
  • 9Arto Salomaa. Public-key Cryptography[ M ]. Spring-verlag, 1990. 被引量:1
  • 10O Goldreich. Secure multi-party computation (working draft) [ M ]. Available from http ://www. wisdom. weizmann. zc. il/home/oded/public_html/foc. html, 1998. 被引量:1

共引文献1

同被引文献268

引证文献34

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部