一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

空間位置關(guān)系的安全多方計算及其應(yīng)用

張衛(wèi)國 孫嫚 陳振華 陳娓

張衛(wèi)國, 孫嫚, 陳振華, 陳娓. 空間位置關(guān)系的安全多方計算及其應(yīng)用[J]. 電子與信息學(xué)報, 2016, 38(9): 2294-2300. doi: 10.11999/JEIT160102
引用本文: 張衛(wèi)國, 孫嫚, 陳振華, 陳娓. 空間位置關(guān)系的安全多方計算及其應(yīng)用[J]. 電子與信息學(xué)報, 2016, 38(9): 2294-2300. doi: 10.11999/JEIT160102
ZHANG Weiguo, SUN Man, CHEN Zhenhua, CHEN Wei. Secure Multi-party Computation of Spatial Relationship and Its Application[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2294-2300. doi: 10.11999/JEIT160102
Citation: ZHANG Weiguo, SUN Man, CHEN Zhenhua, CHEN Wei. Secure Multi-party Computation of Spatial Relationship and Its Application[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2294-2300. doi: 10.11999/JEIT160102

空間位置關(guān)系的安全多方計算及其應(yīng)用

doi: 10.11999/JEIT160102 cstr: 32379.14.JEIT160102
基金項目: 

國家自然科學(xué)基金(U1261114)

Secure Multi-party Computation of Spatial Relationship and Its Application

Funds: 

The National Natural Science Foundation of China (U1261114)

  • 摘要: 空間位置關(guān)系的保密計算屬于安全多方計算中的空間幾何問題,在機密性商業(yè)、工程、軍事等方面有著重要的意義。但目前大多數(shù)空間幾何問題都是通過轉(zhuǎn)化為距離或數(shù)據(jù)對應(yīng)成比例問題解決的,計算復(fù)雜性較高,且應(yīng)用范圍受限。針對這些問題,該文先將原問題轉(zhuǎn)化為一個點是否為一個方程的解,再利用一種簡單高效的內(nèi)積協(xié)議一次性解決了點線、點面、線線、線面、面面等5種空間位置關(guān)系的判定,并利用模擬范例證明了協(xié)議的安全性。該文方案并沒有利用任何公鑰加密算法,取得了信息論安全;并且由于問題的巧妙轉(zhuǎn)化,使得能解決的問題更加廣泛,效率也相對較高。
  • YAO A C. Protocols for secure computations[C]. Proceedings of 23rd IEEE Symposiumon Foundations of Computer Science, Chicago, IL, USA, 1982: 160-164. doi: 10.1109/ SFCS.1982.38.
    KAMM L. Privacy-preserving statistical analysis using secure multi-party computation[D]. [Ph.D. dissertation], University of TARTU, 2015: 50-54.
    劉峰, 薛安榮, 王偉. 一種隱私保護關(guān)聯(lián)規(guī)則挖掘的混合算法[J]. 計算機應(yīng)用研究, 2012, 29(3): 1108-1109. doi: 10.3969/ j.issn.1001-3695.2012.03.084.
    LIU Feng, XUE Anrong, and WANG Wei. Hybrid algorithm for privacy preserving association rules mining[J]. Application Research of Computers, 2012, 29(3): 1108-1109. doi: 10.3969/ j.issn.1001-3695.2012.03.084.
    ROY B. Performance analysis of clustering in privacy preserving data mining[J]. International Journal of Computer Applications Information Technology, 2014, 5(4): 35-39.
    崇志宏, 倪巍偉, 劉騰騰, 等. 一種面向聚類的隱私保護數(shù)據(jù)發(fā)布方法[J]. 計算機研究與發(fā)展, 2010, 47(12): 2083-2089.
    CHONG Zhihong, NI Weiwei, LIU Tengteng, et al. A privacy-preserving data publishing algorithm for clustering application[J]. Journal of Computer Research and Development, 2010, 47(12): 2083-2089.
    LI C and LIN B G. Privacy-preserving point-inclusion two-party computation protocol [C]. 2013 IEEE Fifth International Conferenceon on Computational and Information Sciences (ICCIS), Hubei, China, 2013: 257-260. doi: 10.1109/ICCIS.2013.75.
    王珽, 羅文俊. 安全多方計算在空間幾何問題中的應(yīng)用[J]. 計算機系統(tǒng)應(yīng)用, 2015, 24(1): 156-160. doi: 10.3969/j.issn. 1003-3254.2015.01.029.
    WANG Ting and LUO Wenjun. Applications of secure multi-party computation in spacegeometry problems[J]. Computer Systems Applications, 2015, 24(1): 156-160. doi: 10.3969/j.issn.1003-3254.2015.01.029.
    QIN Jing, DUAN Hongwei, ZHAO Huawei, et al. A new lagrange solution to the privacy-preserving general geometric intersection problem[J]. Journal of Network and Computer Applications, 2014, 46(1): 94-99. doi:10.1016/j.jnca.2014. 08.004.
    GOLDWASSER S. Multi-party computations: Past and present[C]. Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, New York, USA, 1997: 1-6. doi: 10.1145/259380.259405.
    GOLDRE O, MICALI S, and WIGDERSON A. How to play any mental game[C]. Proceedings of the 19th Annual ACM Conference on Theory of Computing, New York, USA, 1987: 218-229.
    DU W L and ATALLAH M J. Secure multi-party computation problems and their applications: A review and open problems[C]. Proceedings of the 2001 Workshop on New Security Paradigms, New York, USA, 2001: 11-22.
    荊巍巍. 安全多方計算中若干基礎(chǔ)協(xié)議及應(yīng)用的研究[D]. [博士論文], 中國科學(xué)技術(shù)大學(xué), 2008. doi: 10.7666/d.y1270516.
    JING Weiwei. Research on several basic protocols and application of secure multi-party, computation[D]. [Ph.D. dissertation], University of Science and Technology of China, 2008. doi: 10.7666/d.y1270516.
    王珽, 羅文俊. 基于閾值的點線距離與位置關(guān)系保密判定協(xié)議[J]. 計算機工程與應(yīng)用, 2010, 46(13): 87-89. doi: 10.3778/ j.issn.1002-8331/.2010.13.026.
    WANG Ting and LUO Wenjun. Privacy-preserving determination protocol for point-line distance and position relation based on threshold[J]. Computer Engineering and Applications, 2010, 46(13): 87-89. doi: 10.3778/j.issn. 1002-8331/.2010.13.026.
    LI Shundong, WU Chunying, WANG Daoshun, et al. Secure multiparty computation of solid geometric problems and their applications[J]. Information Sciences, 2014, 282(10): 401-413. doi: 10.1016/j.ins.2014.04.004.
    羅永龍, 黃劉生, 荊巍巍, 等. 空間幾何對象相對位置判定中的私有信息保護[J]. 計算機研究與發(fā)展, 2006, 43(3): 410-416.
    LUO Yonglong, HUANG Liusheng, JING Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416.
    GOLDREICH O. Foundations of Cryptography: Basic Applications[M]. London: Cambridge University Press, 2004: 599-729.
    CLIFTON C, KANTARCIOGLU M, VAIDYA J, et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Explorations Newsletter, 2002, 4(2): 28-34.
  • 加載中
計量
  • 文章訪問數(shù):  1376
  • HTML全文瀏覽量:  194
  • PDF下載量:  318
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-01-21
  • 修回日期:  2016-06-15
  • 刊出日期:  2016-09-19

目錄

    /

    返回文章
    返回