首页 | 本学科首页   官方微博 | 高级检索  
     

外包数据库系统中隐私匹配与包含关系的安全计算协议
引用本文:蒋亚军,杨波,张明武,陈旭日.外包数据库系统中隐私匹配与包含关系的安全计算协议[J].计算机科学,2011,38(3):120-122,135.
作者姓名:蒋亚军  杨波  张明武  陈旭日
作者单位:1. 华南农业大学信息学院,广州,510642;湖南科技学院计算机与通信工程系,永州,425100
2. 华南农业大学信息学院,广州,510642
3. 上海大学计算机工程与科学学院,上海,200072
基金项目:国家自然科学基金(60773175,60973134),现代通信国家重点实验室基金(9140C1108020906} ,广东省自然科学基金(915106201000058)资助。
摘    要:针对外包数据库系统中的隐私匹配问题,提出了基于分布式环境的安全计算协议(协议1):数据所有者采用Mignotte秘密共享方案将数据集外包,用户与第三方服务提供者交互,通过加法同态加密与秘密重构构造判别式,以判别式的值是否为零来判断用户的数据集的元素是否属于数据所有者的数据集,最终实现隐私匹配。此外,在协议1的基础上还提出了一种判断用户数据集是否包含于数据所有者的数据集的协议(协议2)。在半诚实模型下,采用基于模拟器的方法证明了两个协议的安全性。

关 键 词:外包数据库,秘密共享,隐私匹配,模拟器

Secure Computation Protocol for Private Matching and Inclusion Relation against Outsourced Database System
JIANG Ya-jun,YANG Bo,ZHANG Ming-wu,CHEN Xu-ri.Secure Computation Protocol for Private Matching and Inclusion Relation against Outsourced Database System[J].Computer Science,2011,38(3):120-122,135.
Authors:JIANG Ya-jun  YANG Bo  ZHANG Ming-wu  CHEN Xu-ri
Affiliation:(College of Informatics,South China Agricultural University, Guangzhou 510642 ,China) (Department of Computer and Communication Engineering, Hunan University oI Science and Engineering,Yongzhou 425100,China) (College of Computer Engineering and Science,Shanghai University,Shanghai 200072,China)
Abstract:The secure computation protocol based on distributed environment, namely Protocol 1, was proposed for privale matching against outsourced database system. The data owner adopted Mignotte's secret sharing scheme to outsource a dataset_ The user interacted with some third-party service provider to determine if some elements of the user's dataset belonged to the data owner's dataset by means of additive homomorphic encryption and secret reconstruction to construct discriminant and with the value of discriminant being zero or not, and ultimately realized private matching. In addition, the other protocol was also proposed to determine whether the user' s dataset was included in the owner' s dataset, namely protocol 2. In the semihonest model, the security of the two protocols was proved by simulator.
Keywords:Outsourced databases  Secret sharing  Private matching  Simulator
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号