首页 | 本学科首页   官方微博 | 高级检索  
     

安全两方圆计算协议
引用本文:刘文,罗守山,杨义先,辛阳,肖倩.安全两方圆计算协议[J].北京邮电大学学报,2009,32(3):32-35.
作者姓名:刘文  罗守山  杨义先  辛阳  肖倩
作者单位:北京邮电大学,网络与交换技术国家重点实验室,北京,100876;北京邮电大学,网络与信息攻防技术教育部重点实验室,北京,100876;北京邮电大学,灾备技术国家工程实验室,北京,100876
基金项目:国家自然科学基金,国家高技术研究发展计划(863计划) 
摘    要:圆与圆的关系判断问题和直线与圆的关系判断问题是计算几何中的一个重要问题。在进行这些判定时,若输入的圆或直线等信息由不同的用户提供,且这些信息对其它用户保密,这就是安全计算问题,传统的判定算法不能满足要求。在半诚实模型下提出安全两数和平方计算协议,安全两数关系判断协议,安全两点距离计算协议,安全点线距离计算协议,进而实现保护私有信息的圆-圆、圆-直线关系判断;对于以上协议都进行了正确性、安全性和复杂性的分析。

关 键 词:密码学  安全多方计算  安全几何计算  同态加密算法  
收稿时间:2008-4-17
修稿时间:2008-12-29

A Study of Secure Two-Party Circle Computation Problem
LIU Wen,LUO Shou-shan,YANG Yi-xian,XIN Yang,XIAO Qian.A Study of Secure Two-Party Circle Computation Problem[J].Journal of Beijing University of Posts and Telecommunications,2009,32(3):32-35.
Authors:LIU Wen  LUO Shou-shan  YANG Yi-xian  XIN Yang  XIAO Qian
Affiliation:LIU Wen,LUO Shou-shan,YANG Yi-xian,XIN Yang,XIAO Qian (1.State Key Laboratory of Networking , Switching Technology,Beijing University of Posts , Telecommunications,Beijing 100876,China,2.Key Laboratory of Network , Information Attack , Defence Technology,Ministry of Education,3.National Engineering Laboratory for Disaster Backup , Recovery,China)
Abstract:In computational geometry, determination of circle-circle and line-circle relationship are important problems. If the information of circle or line is supplied by different users and none of them would like to disclose his or her data to others, it is called the secure two-party circular computation problem. In this paper, a secure square of two numbers sum protocol, a secure two numbers relation determination protocol, a secure points distance computational protocol and a secure point-line distance computational protocol are proposed to solve the he circularity-circularity relation determination problem and line-circularity relation determination problem; the correctness, security and efficiency of these protocols are also analyzed
Keywords:cryptograph  secure multi-party computation  secure geometry computation  additive homomorphic encryption  circularity
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《北京邮电大学学报》浏览原始摘要信息
点击此处可从《北京邮电大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号