期刊文献+

保密点包含协议的研究与实现 被引量:1

Research and realization of Private-preserving Point Inclusion Protocol
下载PDF
导出
摘要 特殊安全多方计算已经成为安全多方计算领域中一个新的研究热点。研究了保密计算几何中的点包含问题,基于保密点积协议和百万富翁协议提出了一个半诚实模型下保护私有信息的点包含协议,并对协议的性能进行了分析。该协议在军事,工程研究和商业等领域有着重要的应用前景。 Specific secure multi-party computation has been a new research focus in secure multi-party computation field. This paper focuses the point inclusion problem of private -preserving computational geometry. A new private-preserving point inclusion protocol in the semi-honest model is presented based on private-preserving dot product protocol and Millionaires ’protocol along with analysis of protocol’ capability. The protocol has potential applications in military, engineering research and commerce fields.
出处 《微计算机信息》 2009年第33期13-14,69,共3页 Control & Automation
基金 基金申请人:罗文俊 项目名称:基于安全多方计算的数字签名方案设计与研究 基金颁发部门:贵州省科学技术基金委员会(黔科合J字[2008]2118)
关键词 安全多方计算 百万富翁协议 点积协议 点包含 Secure multi-party computation Millionaires’protocol Dot product protocol Point inclusion
  • 相关文献

参考文献8

  • 1Yao A. C. Protocols for secure computation[C]. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, 1982: 160- 164. 被引量:1
  • 2Chaum D, Crepeau C, Damgard I. Multiparty unconditionally secure protocols[C]. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC '88, 1988:11-19. 被引量:1
  • 3Goldreich O, Micali S, Wigderson A. How to play any mental game [C]. 19th Annual ACM Symposium on Theory of Computing, 1987: 218-229. 被引量:1
  • 4陈芸,张伟.隐私保护数据挖掘方法的研究[J].微计算机信息,2006(07X):239-241. 被引量:7
  • 5Goldwasser S. Multi-party computations: Past and present[C]. In Proceedings of the 16tb Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA USA, 1997: 1-6. 被引量:1
  • 6Atallah M. J, Du Wenliang. Secure multi-party computational geometry [C]. In WADS 2001: Proceedings of the 7th International Workshop on Algorithms and Data Structures, London, UK, Springer-Verlag 2001:165 - 179. 被引量:1
  • 7Ioannidis I,Grama A. An efficient protocol for Yao's millionaires" problem [C]. In Proceedings of the 36th Hawaii International Conferencc on System Science, Hawaii, USA, 2003. 被引量:1
  • 8J. Vaidya, C. Clifton. Privacy preserving association rule mining in vertically partitioned data [C]. In Proceedings of the 8th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, New York: ACM Press, 2002: 639-644. 被引量:1

二级参考文献6

  • 1张特来,刘万军.数据挖掘在供应管理中的应用[J].微计算机信息,2005,21(10X):182-183. 被引量:11
  • 2Han J,Kamber M.Data Mining:Concepts and Techniques.[M].北京:机械工业出版社,2001-08 被引量:1
  • 3Agrawal R and. Srikan R t. Privacy-Preserving Data Mining[J].Proc. of ACM SIGMODIntl. Conf. on Management of Data, 2000. 被引量:1
  • 4Lindell Y and Pinkas B. Privacy preserving data mining[J]. In Advances in Cryptology- CRYPTO, 2000 (2000), 36 - 54. 被引量:1
  • 5Vaidya J and Clifton C. Privacy pre-serving association rule mining in vertically partitioned data[R]. In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2002, 639 - 644. 被引量:1
  • 6Rizvi S J and Haritsa J R. Maintaining Data Privacy in Association Rule Mining [J]. Proc. of '28th Intl. Conf. on Very large Databases (VLDB), 2002. 被引量:1

共引文献6

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部