期刊文献+
共找到2,820篇文章
< 1 2 141 >
每页显示 20 50 100
遥感图象中薄云的去除方法 被引量:65
1
作者 赵忠明 朱重光 《环境遥感》 CSCD 1996年第3期195-199,T001,共6页
云覆盖是遥感图象处理中最常遇到的一种情况,如何有效地去除云的影响,为后续图象识别与分类奠定基础,是图象预处理阶段的一个重要任务。本文介绍使用同态滤波进行去云处理方法,并分别对实际的卫星象片和航空象片进行处理,说明了方... 云覆盖是遥感图象处理中最常遇到的一种情况,如何有效地去除云的影响,为后续图象识别与分类奠定基础,是图象预处理阶段的一个重要任务。本文介绍使用同态滤波进行去云处理方法,并分别对实际的卫星象片和航空象片进行处理,说明了方法的有效性和可操作性。 展开更多
关键词 遥感图象 薄云 去除法 图象处理
原文传递
Secure Two-Party Point-Circle Inclusion Problem 被引量:16
2
作者 罗永龙 黄刘生 仲红 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第1期88-91,共4页
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ... Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly. 展开更多
关键词 secure multi-party computation computational geometry homomorphic encryption scheme private comparison
原文传递
一种用于虹膜识别的相位匹配算法 被引量:1
3
作者 陈颖 秦荫桐 +1 位作者 韩方 陆亨立 《上海大学学报(自然科学版)》 CAS CSCD 2002年第1期31-34,共4页
虹膜识别是一种非侵犯性的人类身份识别技术 .在虹膜自动识别过程中 ,特征的分析和匹配是非常重要的部分 .此文讨论了虹膜图像定位、增强等预处理的方法 ,并提出了一种相位相关的匹配算法对虹膜图像进行识别和判断 .实验证明 ,该方法运... 虹膜识别是一种非侵犯性的人类身份识别技术 .在虹膜自动识别过程中 ,特征的分析和匹配是非常重要的部分 .此文讨论了虹膜图像定位、增强等预处理的方法 ,并提出了一种相位相关的匹配算法对虹膜图像进行识别和判断 .实验证明 ,该方法运算速度较快 ,并有较高的识别率 ,效果良好 . 展开更多
关键词 虹膜定位 同态增晰 相位匹配算法 人类身份识别 图像识别 虹膜识别
下载PDF
云存储中一种基于格的数据完整性验证方法 被引量:11
4
作者 谭霜 何力 +1 位作者 陈志坤 贾焰 《计算机研究与发展》 EI CSCD 北大核心 2015年第8期1862-1872,共11页
随着云存储技术的发展,用户可以从远程云中按需获取高质量的应用和服务,而不用担心本地的数据管理存储.由于用户在本地不再保留任何数据副本,故无法确保云中数据的完整性.为了解决这一问题,提出了一种面向于云存储环境的、基于格的数据... 随着云存储技术的发展,用户可以从远程云中按需获取高质量的应用和服务,而不用担心本地的数据管理存储.由于用户在本地不再保留任何数据副本,故无法确保云中数据的完整性.为了解决这一问题,提出了一种面向于云存储环境的、基于格的数据完有性验证机制,该机制能有效地识别云存储中侵犯用户数据完整性的违规行为,且在随机预言机模型下被证明是安全的.另外,设计的协议还具有其他3种好的属性,即支持数据块级的动态操作、支持签名数据上的同态计算及支持多用户验证.最后,给出了现有的多种完整性验证机制之间的对比,以及基于格的数据完整性验证方法存在的一些问题及发展方向. 展开更多
关键词 云存储 格理论 公开验证 数据完整性验证 同态
下载PDF
Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching 被引量:7
5
作者 Xiaoliang Che Tanping Zhou +3 位作者 Ningbo Li Haonan Zhou Zhenhua Chen Xiaoyuan Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期564-578,共15页
The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and ke... The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and keys.In 2012,Lopez-Alt et al.proposed the first NTRU-type MKFHE scheme,the LTV12 scheme,using the key-switching and modulus-reduction techniques,whose security relies on two assumptions:the Ring Learning With Error (RLWE) assumption and the Decisional Small Polynomial Ratio (DSPR) assumption.However,the LTV12and subsequent NTRU-type schemes are restricted to the family of power-of-2 cyclotomic rings,which may affect the security in the case of subfield attacks.Moreover,the key-switching technique of the LTV12 scheme requires a circular application of evaluation keys,which causes rapid growth of the error and thus affects the circuit depth.In this paper,an NTRU-type MKFHE scheme over prime cyclotomic rings without key-switching is proposed,which has the potential to resist the subfield attack and decrease the error exponentially during the homomorphic evaluating process.First,based on the RLWE and DSPR assumptions over the prime cyclotomic rings,a detailed analysis of the factors affecting the error during the homomorphic evaluations in the LTV12 scheme is provided.Next,a Low Bit Discarded&Dimension Expansion of Ciphertexts (LBD&DEC) technique is proposed,and the inherent homomorphic multiplication decryption structure of the NTRU is proposed,which can eliminate the key-switching operation in the LTV12 scheme.Finally,a leveled NTRU-type MKFHE scheme is developed using the LBD&DEC and modulus-reduction techniques.The analysis shows that the proposed scheme compared to the LTV12 scheme can decrease the magnitude of the error exponentially and minimize the dimension of ciphertexts. 展开更多
关键词 NTRU-type Multi-Key Fully homomorphic Encryption(MKFHE) prime cyclotomic rings Low Bit Discarded(LBD) homomorphic multiplication decryption structure
原文传递
A Method of Homomorphic Encryption 被引量:8
6
作者 XIANG Guang-li CHEN Xin-meng +1 位作者 ZHU Ping MA Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期181-184,共4页
The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base ... The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. 展开更多
关键词 SECURITY private homomorphism similar modul homomorphic encryption scheme
下载PDF
半群的区间值反模糊子半群的性质 被引量:10
7
作者 王丰效 宋爱丽 《数学的实践与认识》 北大核心 2018年第5期207-212,共6页
作为模糊代数的一个研究领域,区间值模糊子半群对模糊子半群的研究至关重要.引入了半群的区间值反模糊子半群的概念,对区间值反模糊子半群的性质进行了研究.讨论了半群的区间值反模糊子半群关于并运算的封闭性质.最后给出了半群的... 作为模糊代数的一个研究领域,区间值模糊子半群对模糊子半群的研究至关重要.引入了半群的区间值反模糊子半群的概念,对区间值反模糊子半群的性质进行了研究.讨论了半群的区间值反模糊子半群关于并运算的封闭性质.最后给出了半群的区间值模糊子半群的同态像和原像的相关性质.相关的研究结果丰富了半群的模糊理论. 展开更多
关键词 半群 区间值反模糊子半群 同态
原文传递
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid 被引量:9
8
作者 Siguang Chen Li Yang +2 位作者 Chuanxin Zhao Vijayakumar Varadarajan Kun Wang 《Engineering》 SCIE EI 2022年第1期159-169,共11页
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services.However,this efficient and reliable service relies on colle... As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services.However,this efficient and reliable service relies on collecting and analyzing users’electricity consumption data frequently,which induces various security and privacy threats.To address these challenges,we propose a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabled smart grid named DA-SADA.Specifically,we design a three-tier architecture-based data aggregation framework by integrating fog computing and the blockchain,which provides strong support for achieving efficient and secure data collection in smart grids.Subsequently,we develop a secure and anonymous data aggregation mechanism with low computational overhead by jointly leveraging the Paillier encryption,batch aggregation signature and anonymous authentication.In particular,the system achieves fine-grained data aggregation and provides effective support for power dispatching and price adjustment by the designed double-blockchain and two-level data aggregation.Finally,the superiority of the proposed scheme is illustrated by a series of security and computation cost analyses. 展开更多
关键词 Blockchain Fog computing homomorphic encryption Smart grid ANONYMITY
下载PDF
Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials 被引量:6
9
作者 Yatao Yang Shuang Zhang +2 位作者 Junming Yang Jia Li Zichen Li 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期478-485,共8页
Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed. A new targeted fully homomorphic encryption scheme based on the discrete logarithm problem is pre... Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed. A new targeted fully homomorphic encryption scheme based on the discrete logarithm problem is presented. Public-key encryption cryptosystems are classified to examine homomorphic encryption. Without employing techniques proposed by Gentry such as somewhat homomorphic and bootstrapping techniques, or relinearization technique proposed by Brakerski et al., a new method called "Double Decryption Algorithm" is employed in our cryptography to satisfy a fully or targeted fully homomorphic property. Inspired by EIGamal and BGN cryptography, we obtain the desired fully homomorphic property by selecting a new group and adding an extra component to the ciphertext. Proof of semantic security is also demonstrated. 展开更多
关键词 targeted fully homomorphic encryption discrete logarithm problem exponential function method power function method
原文传递
Secure and Efficient Outsourced Computation in Cloud Computing Environments
10
作者 Varun Dixit Davinderjit Kaur 《Journal of Software Engineering and Applications》 2024年第9期750-762,共13页
Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodo... Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodologies to address these challenges. Through a series of experiments, we evaluate the performance, security, and efficiency of the proposed algorithms in real-world cloud environments. Our results demonstrate the effectiveness of homomorphic encryption-based secure computation, secure multiparty computation, and trusted execution environment-based approaches in mitigating security threats while ensuring efficient resource utilization. Specifically, our homomorphic encryption-based algorithm exhibits encryption times ranging from 20 to 1000 milliseconds and decryption times ranging from 25 to 1250 milliseconds for payload sizes varying from 100 KB to 5000 KB. Furthermore, our comparative analysis against state-of-the-art solutions reveals the strengths of our proposed algorithms in terms of security guarantees, encryption overhead, and communication latency. 展开更多
关键词 Secure Computation Cloud Computing homomorphic Encryption Secure Multiparty Computation Resource Optimization
下载PDF
Impact of Artificial Intelligence on Corporate Leadership
11
作者 Daniel Schilling Weiss Nguyen Mudassir Mohiddin Shaik 《Journal of Computer and Communications》 2024年第4期40-48,共9页
Artificial Intelligence (AI) is transforming organizational dynamics, and revolutionizing corporate leadership practices. This research paper delves into the question of how AI influences corporate leadership, examini... Artificial Intelligence (AI) is transforming organizational dynamics, and revolutionizing corporate leadership practices. This research paper delves into the question of how AI influences corporate leadership, examining both its advantages and disadvantages. Positive impacts of AI are evident in communication, feedback systems, tracking mechanisms, and decision-making processes within organizations. AI-powered communication tools, as exemplified by Slack, facilitate seamless collaboration, transcending geographical barriers. Feedback systems, like Adobe’s Performance Management System, employ AI algorithms to provide personalized development opportunities, enhancing employee growth. AI-based tracking systems optimize resource allocation, as exemplified by studies like “AI-Based Tracking Systems: Enhancing Efficiency and Accountability.” Additionally, AI-powered decision support, demonstrated during the COVID-19 pandemic, showcases the capability to navigate complex challenges and maintain resilience. However, AI adoption poses challenges in human resources, potentially leading to job displacement and necessitating upskilling efforts. Managing AI errors becomes crucial, as illustrated by instances like Amazon’s biased recruiting tool. Data privacy concerns also arise, emphasizing the need for robust security measures. The proposed solution suggests leveraging Local Machine Learning Models (LLMs) to address data privacy issues. Approaches such as federated learning, on-device learning, differential privacy, and homomorphic encryption offer promising strategies. By exploring the evolving dynamics of AI and leadership, this research advocates for responsible AI adoption and proposes LLMs as a potential solution, fostering a balanced integration of AI benefits while mitigating associated risks in corporate settings. 展开更多
关键词 Artificial Intelligence (AI) Corporate Leadership Communication Feedback Systems Tracking Mechanisms DECISION-MAKING Local Machine Learning Models (LLMs) Federated Learning On-Device Learning Differential Privacy homomorphic Encryption
下载PDF
Quantum homomorphic broadcast multi-signature based on homomorphic aggregation 被引量:1
12
作者 徐鑫 殷爱菡 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期254-261,共8页
Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has ... Quantum multi-signature has attracted extensive attention since it was put forward.Beside its own improvement,related research is often combined with other quantum signature.However,this type of quantum signature has one thing in common,that is,the generation and verification of signature depend heavily on the shared classical secret key.In order to increase the reliability of signature,the homomorphic aggregation technique is applied to quantum multi-signature,and then we propose a quantum homomorphic multi-signature protocol.Unlike previous quantum multi-signature protocols,this protocol utilizes homomorphic properties to complete signature generation and verification.In the signature generation phase,entanglement swapping is introduced,so that the individual signatures of multiple users are aggregated into a new multi-signature.The original quantum state is signed by the shared secret key to realize the verification of the signature in the verification phase.The signature process satisfies the homomorphic property,which can improve the reliability of the signature. 展开更多
关键词 quantum signature homomorphic aggregation homomorphic multi-signature Bell state
下载PDF
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution 被引量:1
13
作者 Tao Yin Changgen Peng +2 位作者 Weijie Tan Dequan Xu Hanlin Tang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期827-843,共17页
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining ... In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset,when the data is provided by multiple parties,training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge.To address this issue,this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos.The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection operations between the two parties holding the data.After determining which entities are shared,the participants train the model locally using the shared entity data to obtain the local generalized linear model intermediate parameters.The homomorphic encryption algorithms are introduced to interact with and update the model intermediate parameters to collaboratively complete the joint training of the car insurance rate-setting model.Performance tests on two publicly available datasets show that the proposed federated Tweedie regression algorithm can effectively generate Tweedie regression models that leverage the value of data fromboth partieswithout exchanging data.The assessment results of the scheme approach those of the Tweedie regressionmodel learned fromcentralized data,and outperformthe Tweedie regressionmodel learned independently by a single party. 展开更多
关键词 Rate setting Tweedie distribution generalized linear models federated learning homomorphic encryption
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
14
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Secure Network Coding Against Intra/Inter-Generation Pollution Attacks 被引量:4
15
作者 刘光军 王斌 《China Communications》 SCIE CSCD 2013年第8期100-110,共11页
By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue eith... By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files. 展开更多
关键词 network coding pollution attacks homomorphic signature authentication homomorphic cryptography
下载PDF
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
16
作者 Zhiyong Zheng Fengxia Liu Kun Tian 《Journal of Information Security》 2023年第4期366-395,共30页
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi... We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique. 展开更多
关键词 Fully homomorphic Encryption Ideal Lattices Chinese Remainder Theorem General Compact Knapsacks Problem
下载PDF
一种用于云隐私保护的线性同态加密方案 被引量:6
17
作者 王廷 喻建平 杨懿竣 《新型工业化》 2013年第1期60-67,共8页
云存储是未来信息存储的一种理想方式,它提供方便易用的外包存储空间,以缓解爆炸增长的信息对存储空间的海量需求,然而,数据的存储存在着安全与隐私泄露等问题,致使云存储服务的推广与普及存在困难。针对用户各数据的安全需求,本文提出... 云存储是未来信息存储的一种理想方式,它提供方便易用的外包存储空间,以缓解爆炸增长的信息对存储空间的海量需求,然而,数据的存储存在着安全与隐私泄露等问题,致使云存储服务的推广与普及存在困难。针对用户各数据的安全需求,本文提出了一高效的线性同态加密方案(LHES),其安全性基于多项式环上差错学习(R-LWE)问题的困难性。分析表明,该方案的效率比基于格上差错学习(LWE)问题的加密方案有很大的提高,并且在随机预言机模型下是选择明文攻击不可识别的。 展开更多
关键词 公钥加密 R-LWE 同态 隐私保护
下载PDF
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles
18
作者 Naiyu Wang Wenti Yang +4 位作者 Xiaodong Wang Longfei Wu Zhitao Guan Xiaojiang Du Mohsen Guizani 《Digital Communications and Networks》 SCIE CSCD 2024年第1期126-134,共9页
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be... The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model. 展开更多
关键词 Federated learning Blockchain Privacy-preservation homomorphic encryption Internetof vehicles
下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:2
19
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
下载PDF
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
20
作者 Renwu Yan Yang Zheng +1 位作者 Ning Yu Cen Liang 《Big Data Mining and Analytics》 EI CSCD 2024年第1期131-141,共11页
Under the general trend of the rapid development of smart grids,data security and privacy are facing serious challenges;protecting the privacy data of single users under the premise of obtaining user-aggregated data h... Under the general trend of the rapid development of smart grids,data security and privacy are facing serious challenges;protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread attention.In this study,we propose an encryption scheme on the basis of differential privacy for the problem of user privacy leakage when aggregating data from multiple smart meters.First,we use an improved homomorphic encryption method to realize the encryption aggregation of users’data.Second,we propose a double-blind noise addition protocol to generate distributed noise through interaction between users and a cloud platform to prevent semi-honest participants from stealing data by colluding with one another.Finally,the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism.Even if an attacker has enough background knowledge,the security of the electricity information of one another can be ensured. 展开更多
关键词 smart grid homomorphic encryption data aggregation differential privacy cloud computing
原文传递
上一页 1 2 141 下一页 到第
使用帮助 返回顶部