空間位置關(guān)系的安全多方計算及其應(yīng)用
doi: 10.11999/JEIT160102 cstr: 32379.14.JEIT160102
基金項目:
國家自然科學(xué)基金(U1261114)
Secure Multi-party Computation of Spatial Relationship and Its Application
Funds:
The National Natural Science Foundation of China (U1261114)
-
摘要: 空間位置關(guān)系的保密計算屬于安全多方計算中的空間幾何問題,在機密性商業(yè)、工程、軍事等方面有著重要的意義。但目前大多數(shù)空間幾何問題都是通過轉(zhuǎn)化為距離或數(shù)據(jù)對應(yīng)成比例問題解決的,計算復(fù)雜性較高,且應(yīng)用范圍受限。針對這些問題,該文先將原問題轉(zhuǎn)化為一個點是否為一個方程的解,再利用一種簡單高效的內(nèi)積協(xié)議一次性解決了點線、點面、線線、線面、面面等5種空間位置關(guān)系的判定,并利用模擬范例證明了協(xié)議的安全性。該文方案并沒有利用任何公鑰加密算法,取得了信息論安全;并且由于問題的巧妙轉(zhuǎn)化,使得能解決的問題更加廣泛,效率也相對較高。
-
關(guān)鍵詞:
- 安全多方計算 /
- 位置關(guān)系 /
- 空間幾何 /
- 內(nèi)積協(xié)議
Abstract: Privacy-preserving determination of spatial relationship belongs to spatial geometry problem in secure multiparty computation, which is significant to confidential business, engineering, military, etc. However, most existing schemes transform the original problem into the distance problem or the correspondingly proportional data problem, which makes the computation complexity high and the application range being limited. To deal with these problems, first, the original problem is transformed into whether a point is the solution of equation. Based on the technique, a simple and efficient scalar product protocol is adopted to determine five spatial relationships all at once: point and line, point and plane, line and line, line and plane, and plane and plane. In addition, the security of the proposed protocol is proved with simulation paradigm. The proposed scheme does not employ any public key encryption algorithm so as to achieve the information security. The analysis indicates the trick transformation makes the proposed scheme higher efficient and more applicable than the known schemes. -
YAO A C. Protocols for secure computations[C]. Proceedings of 23rd IEEE Symposiumon Foundations of Computer Science, Chicago, IL, USA, 1982: 160-164. doi: 10.1109/ SFCS.1982.38. KAMM L. Privacy-preserving statistical analysis using secure multi-party computation[D]. [Ph.D. dissertation], University of TARTU, 2015: 50-54. 劉峰, 薛安榮, 王偉. 一種隱私保護關(guān)聯(lián)規(guī)則挖掘的混合算法[J]. 計算機應(yīng)用研究, 2012, 29(3): 1108-1109. doi: 10.3969/ j.issn.1001-3695.2012.03.084. LIU Feng, XUE Anrong, and WANG Wei. Hybrid algorithm for privacy preserving association rules mining[J]. Application Research of Computers, 2012, 29(3): 1108-1109. doi: 10.3969/ j.issn.1001-3695.2012.03.084. ROY B. Performance analysis of clustering in privacy preserving data mining[J]. International Journal of Computer Applications Information Technology, 2014, 5(4): 35-39. 崇志宏, 倪巍偉, 劉騰騰, 等. 一種面向聚類的隱私保護數(shù)據(jù)發(fā)布方法[J]. 計算機研究與發(fā)展, 2010, 47(12): 2083-2089. CHONG Zhihong, NI Weiwei, LIU Tengteng, et al. A privacy-preserving data publishing algorithm for clustering application[J]. Journal of Computer Research and Development, 2010, 47(12): 2083-2089. LI C and LIN B G. Privacy-preserving point-inclusion two-party computation protocol [C]. 2013 IEEE Fifth International Conferenceon on Computational and Information Sciences (ICCIS), Hubei, China, 2013: 257-260. doi: 10.1109/ICCIS.2013.75. 王珽, 羅文俊. 安全多方計算在空間幾何問題中的應(yīng)用[J]. 計算機系統(tǒng)應(yīng)用, 2015, 24(1): 156-160. doi: 10.3969/j.issn. 1003-3254.2015.01.029. WANG Ting and LUO Wenjun. Applications of secure multi-party computation in spacegeometry problems[J]. Computer Systems Applications, 2015, 24(1): 156-160. doi: 10.3969/j.issn.1003-3254.2015.01.029. QIN Jing, DUAN Hongwei, ZHAO Huawei, et al. A new lagrange solution to the privacy-preserving general geometric intersection problem[J]. Journal of Network and Computer Applications, 2014, 46(1): 94-99. doi:10.1016/j.jnca.2014. 08.004. GOLDWASSER S. Multi-party computations: Past and present[C]. Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, New York, USA, 1997: 1-6. doi: 10.1145/259380.259405. GOLDRE O, MICALI S, and WIGDERSON A. How to play any mental game[C]. Proceedings of the 19th Annual ACM Conference on Theory of Computing, New York, USA, 1987: 218-229. DU W L and ATALLAH M J. Secure multi-party computation problems and their applications: A review and open problems[C]. Proceedings of the 2001 Workshop on New Security Paradigms, New York, USA, 2001: 11-22. 荊巍巍. 安全多方計算中若干基礎(chǔ)協(xié)議及應(yīng)用的研究[D]. [博士論文], 中國科學(xué)技術(shù)大學(xué), 2008. doi: 10.7666/d.y1270516. JING Weiwei. Research on several basic protocols and application of secure multi-party, computation[D]. [Ph.D. dissertation], University of Science and Technology of China, 2008. doi: 10.7666/d.y1270516. 王珽, 羅文俊. 基于閾值的點線距離與位置關(guān)系保密判定協(xié)議[J]. 計算機工程與應(yīng)用, 2010, 46(13): 87-89. doi: 10.3778/ j.issn.1002-8331/.2010.13.026. WANG Ting and LUO Wenjun. Privacy-preserving determination protocol for point-line distance and position relation based on threshold[J]. Computer Engineering and Applications, 2010, 46(13): 87-89. doi: 10.3778/j.issn. 1002-8331/.2010.13.026. LI Shundong, WU Chunying, WANG Daoshun, et al. Secure multiparty computation of solid geometric problems and their applications[J]. Information Sciences, 2014, 282(10): 401-413. doi: 10.1016/j.ins.2014.04.004. 羅永龍, 黃劉生, 荊巍巍, 等. 空間幾何對象相對位置判定中的私有信息保護[J]. 計算機研究與發(fā)展, 2006, 43(3): 410-416. LUO Yonglong, HUANG Liusheng, JING Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416. GOLDREICH O. Foundations of Cryptography: Basic Applications[M]. London: Cambridge University Press, 2004: 599-729. CLIFTON C, KANTARCIOGLU M, VAIDYA J, et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Explorations Newsletter, 2002, 4(2): 28-34. -
計量
- 文章訪問數(shù): 1376
- HTML全文瀏覽量: 194
- PDF下載量: 318
- 被引次數(shù): 0