首页 | 本学科首页   官方微博 | 高级检索  
     

半诚实模型下公平高效的安全两方比较协议
引用本文:陈良,高成敏. 半诚实模型下公平高效的安全两方比较协议[J]. 计算机工程与应用, 2010, 46(36): 126-132. DOI: 10.3778/j.issn.1002-8331.2010.36.035
作者姓名:陈良  高成敏
作者单位:1.华南理工大学 计算机科学与工程学院,广州 510640 2.广东警官学院 计算机系,广州 510232
摘    要:姚氏百万富翁问题的实质是在秘密状态下比较两个数的大小,它是其他保密计算的一个基本模块,并在电子商务如投标、拍卖等应用中具有重要作用。当前的解决方案存在计算和通信开销较高、比较的数的范围有限等缺点。基于修改的ElGamal算法提出并证明了乘法和减法同态加密系统。基于此设计了半诚实模型下公平高效的安全两方比较协议。通过证明、实例和与其他协议比较表明其具有安全性、公平性、低的计算和通信开销和可秘密比较两个实数等特性。

关 键 词:百万富翁问题  同态加密  减法同态  安全两方比较实数  保密计算  
收稿时间:2009-05-26
修稿时间:2009-7-31 

Fair and efficient protocol for secure two-party comparing under semi-honest model
CHEN Liang,GAO Cheng-min. Fair and efficient protocol for secure two-party comparing under semi-honest model[J]. Computer Engineering and Applications, 2010, 46(36): 126-132. DOI: 10.3778/j.issn.1002-8331.2010.36.035
Authors:CHEN Liang  GAO Cheng-min
Affiliation:1.School of Computer Science & Engineering,South China University of Technology,Guangzhou 510640,China 2.Department of Computer,Guangdong Police College,Guangzhou 510232,China
Abstract:The essential of Yao’s millionaire problem is securely comparing two numbers,which is a basic building block of secure computations and has many important applications in e-commerce,such as bidding,auction and so on.But known solutions have some disadvantagesf,or example expensive costs of computing and communicatingl,imited ranges of compared numbers.This paper proposes a modified ElGamal algorithm,based on which multiplicative and subtractive homomorphic cryp-tosystem is presented and proved.Based on the homomorphic cryptosystem,Fair and Efficient Protocol for Secure Two-party Comparing(FEPSTC) under semi-honest model is constructed.The main properties of the FEPSTC are securityf,airnessl,ower costs of communication and computational complexity,and comparing real numbers.They are proved and illustrated by an ex-ample and by comparing with other protocols.
Keywords:millionaire problem  homomorphic cryptosystem  subtractive homomorphism  secure two-party comparing real number  secure computing
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号