期刊文献+

安全多方的统计分析问题及其应用 被引量:14

Secure Multi-party Statistical Analysis Problems and Their Applications
下载PDF
导出
摘要 关于安全多方计算(SMC)的研究是目前国际上的研究热点之一,分布式统计分析中对各用户的隐私进行保护是一类特殊的SMC问题。目前的分布式统计算法至少需要一个计算节点能收集到所有数据信息,因而并不适用于保护隐私的计算要求。文章用形式化方法描述了多方安全求和协议,设计了相关系数、线形回归等基本统计分析方法的安全计算协议,对其性能进行了分析,并讨论了它们的实际应用问题。 At present,research on Secure Multi-party Computation(SMC) is of great interest in the field of information security.Privacy-preserving statistical analysis in distributed system is a special SMC problem.The known methods for statistical analysis with all original data being gathered into a centralized site are not fit for the privacy-preserving situation.In this paper,we define a set of formalized language for SMC protocols,with which the secure sum algorithm is described,develop some secure multi-party statistical analysis protocols such as correlation and linear regression and their performances,and their applications are also discussed.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第24期141-143,共3页 Computer Engineering and Applications
基金 国家973基础规划项目(编号:2003CB317000) 安徽省教育厅重点科研项目(编号:2003kj049zd) 安徽省教学研究项目(编号:2005166) 安徽省教育厅自然科学基金项目(编号:2003kj139)资助
关键词 安全多方计算 统计分析 安全求和 协议 Secure Multi-party Computation, statistical analysis, secure sum, protocol
  • 相关文献

参考文献12

  • 1O Goldreich.Secure multi-party computation.manuscript version 1.3. http ://theory.lcs.mit.edu/-oded, 2002. 被引量:1
  • 2A C Yao.Protocols for secure computations[C].In:Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 1982:160-164. 被引量:1
  • 3C Cachin.Efficient Private Bidding and Auctions with an Oblivious Third Party[C].In:Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999 : 120- 127. 被引量:1
  • 4A C Yao.How to generate and exchange secrets[C].In:Proceedings 27th IEEE Symposium on Foundations of Computer Science, 1986: 162-167. 被引量:1
  • 5O Goldreich,S Micali,A Wigderson.How to play any mental game[C]. In:Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987 : 218-229. 被引量:1
  • 6S Goldwasser.Multi-party computations : Past and present[C].In : Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, 1997:1-6. 被引量:1
  • 7秦静,张振峰,冯登国,李宝.无信息泄漏的比较协议[J].软件学报,2004,15(3):421-427. 被引量:49
  • 8Wenliang Du,Mikhail J Atallah. Privacy-preserving statistical analysis[C].In:Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2001 : 102- 110. 被引量:1
  • 9Benaloh J C.Secret sharing homomorphisms:Keeping a secret secret[C]. In:Proceedings of Crypto'86, Lecture Notes on Comput Sci,263, Springer Verlag, 1986 : 251 -260. 被引量:1
  • 10Chris Clifton,Murat Kantarcioglu,Xiaodong Lin et al.Tools for privacy preserving[J].Distributed Data Mining ACM SIGKDD Explorations, 2003;4(2) : 1-7. 被引量:1

二级参考文献12

  • 1Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. htttp://theory.lcs.mit.edu/-oded 被引量:1
  • 2Cramer R. Introduction to secure computation. In: Damgaard I, ed. Lectures on Data Security-Modern Cryptology in Theory and Practice. Lecture Notes in Computer Science, Vol 1561. Springer-Verlag, 1999. 16-62. 被引量:1
  • 3Yao AC. Protocols for secure computation. In: Proc. of the 23rd IEEE Symp. on Foundation of Computer Science. Chicago: IEEE Computer Society, 1982. 160-164. 被引量:1
  • 4Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999.120~127. 被引量:1
  • 5Fagin R, Naor M, Winkler P. Comparing information without leaking it. Communications of the ACM, 1996,39(5):77-85. 被引量:1
  • 6Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley & Sons, Inc., 1996. 被引量:2
  • 7Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed.Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vo1.1592, Springer-Verlag, 1999.402~414. 被引量:1
  • 8Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc.of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998.59~66. 被引量:1
  • 9Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring. In: Nyberg K, ed. Proc. of the Advances in Cryptology-EUROCRYPT'98. Lecture Notes in Computer Science, Vol 1403, Springer-Verlag, 1998. 308~318. 被引量:1
  • 10Paillier P. Public-Key cryptosystem based on composite degree residuosity classes. In: Proc. of the Advances in Cryptology-EUROCRYPT'99. Lecture Notes in Computer Science, Vol 1592, Springer-Verlag, 1999. 223~238. 被引量:1

共引文献48

同被引文献130

引证文献14

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部