首页 | 本学科首页   官方微博 | 高级检索  
     

向量等分量数的保密计算及应用
引用本文:窦家维,陈明艳,成雯. 向量等分量数的保密计算及应用[J]. 软件学报, 2022, 33(5): 1907-1921
作者姓名:窦家维  陈明艳  成雯
作者单位:陕西师范大学 数学与信息科学学院, 陕西 西安 710119;陕西师范大学 计算机科学学院, 陕西 西安 710119
基金项目:国家自然科学基金(61272435)
摘    要:随着信息技术的快速发展, 在保护数据隐私的条件下进行多方合作计算变得越来越普及, 安全多方计算已经成为解决这类保密计算问题的核心技术. 向量的保密计算是安全多方计算的重要研究方向, 目前有很多研究成果, 包括保密计算向量的点积, 保密的向量求和等. 但关于保密计算向量等分量数的研究成果还很少, 且主要研究向量分量在有全...

关 键 词:密码学  安全多方计算  向量等分量数  同态加密  编码方法
收稿时间:2020-07-24
修稿时间:2020-10-06

Securely Computing Equal Components of Private Vectors and Its Applications
DOU Jia-Wei,CHEN Ming-Yan,CHENG Wen. Securely Computing Equal Components of Private Vectors and Its Applications[J]. Journal of Software, 2022, 33(5): 1907-1921
Authors:DOU Jia-Wei  CHEN Ming-Yan  CHENG Wen
Abstract:With the rapid development of the information technology, it becomes more and more popular that multiparty performs cooperative computation on their private data while preserving their privacy. Secure multiparty computation is a key privacy-preserving technology to address such security issues. The secure vector computation is an active area of secure multiparty computation. At present, there are many researches into secure vector computation such as private scalar product and private vector summation. There are few researches on securely computing the number of equal components of private vectors. These researches focus on secure two-party computation that all the components of vectors are drawn from a restricted range. This study focuses on privately computing the number of equal component of vectors and determining the relationship between the number and a threshold value. To this end, a component-matrix encoding is firstly proposed to encode a component of a vector. Then based on the ElGamal cryptosystem, a simple and efficient secure multiparty protocol is designed to compute number of equal components of vectors. Based on this protocol, an efficient secure multiparty protocol is designed to determine whether the number of equal components of vectors is larger than a threshold. The protocols do not restrict the data range of components. The correctness of the protocols is analyzed and it is proved that they are secure in the semi-honest model. Theoretical efficiency analysis and experimental result show that these protocols are simple and efficient. Finally, these protocols are used as building block to solve some practical secure multiparty computation problems.
Keywords:cryptography  secure multi-party computation  number of equal components  homomorphic encryption  encoding scheme
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号