Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 97-110.doi: 10.11959/j.issn.2096-109x.2022038
• Papers • Previous Articles Next Articles
Xuhong LIU, Chen SUN
Revised:
2022-03-19
Online:
2022-06-15
Published:
2022-06-01
CLC Number:
Xuhong LIU, Chen SUN. Private-preserving scientific computation of the rational numbers[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 97-110.
[1] | YAO A C , . Protocols for secure computations[C]// Proceedings of the 23th Annual Symposium on Foundations of Computer Science. 1982: 160-164. |
[2] | GOLDWASSER S , . Multi-party computations:past and present[C]// The 16th Annual ACM Symposium on Principles of Distributed Computing. 1997: 1-6. |
[3] | CRAMER R , DAMGARD IB , NIELSEN J B . Secure multiparty computation[M]. London: Cambridge University Press, 2015. |
[4] | GOLDREICH O , MICALI S , WIGDERSON A . How to play any mental game[C]// Proceedings of the 19th Annual ACM Conference on Theory of Computing. 1987: 218-229. |
[5] | GOLDREICH O . The fundamental of cryptography:basic applications[M]. London: Cambridge University Press, 2004. |
[6] | 张兴兰, 郑炜 . 基于博弈论的安全多方计算的研究[J]. 网络与信息安全学报, 2018,4(1): 52-56. |
ZHANG X L , ZHENG W . Research on security multi-party computing based on game theory[J]. Chinese Journal of Network and Information Security, 2018,4(1): 52-56. | |
[7] | HIROFUMI M , NORITAKA S , HIROMI M . A proposal of profit sharing method for secure multiparty computation[J]. International Journal of Innovative Computing Information and Control, 2018,14(2): 727-735. |
[8] | 邢欢, 张琳 . 基于 paillier 的隐私保护下关联规则挖掘方法[J]. 网络与信息安全学报, 2016,2(1): 53-59. |
XING H , ZHANG L . Privacy-preserving mining of association rules based on paillier encryption algorithm[J]. Chinese Journal of Network and Information Security, 2016,2(1): 53-59. | |
[9] | SHAO Y , HONG W J , LI Z J . A new method to compute ratio of secure summations and its application in privacy preserving distributed data mining[J]. IEEE Access, 2019,7 20756-20766. |
[10] | 窦家维, 王颖囡, 葛雪 . 区间关系保密计算若干问题研究[J]. 电子学报, 2021,49(1): 50-57. |
DOU J W , WANG Y N , GE X . Some research on secure interval relation computation[J]. Acta Electronica Sinica, 2021,49(1): 50-57. | |
[11] | 张明武, 冷文韬, 沈华 . 隐私保护的点与任意多边形位置关系判定[J]. 密码学报, 2019,6(4): 443-454. |
ZHANG M W , LENG W T , SHEN H . Privacy preservation protocol to determine position relation between pointsand arbitrary- polygons[J]. Journal of Cryptologic Research, 2019,6(4): 443-454. | |
[12] | 何贤芒 . 基于差分隐私保护技术的多方求和查询方法[J]. 网络与信息安全学报, 2020,6(3): 14-18. |
HE X M . Multi-party summation query method based on differential privacy[J]. Chinese Journal of Network and Information Security, 2020,6(3): 14-18. | |
[13] | QAOSAR M , ZAMAN A , SIDDIQUE M A ,et al. Privacy-preserving secure computation of skyline query in distributed multi-party databases[J]. Information, 2019,10(3): 119. |
[14] | DU W L . A study of several specific secure two-party computation problems[D]. West Lafayette:Purdue University, 2001. |
[15] | CHEN X B , XU G , NIU X X ,et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement[J]. Optics Communications, 2010,283(7): 1561-1565. |
[16] | GONG L M , YANG B , TA O X ,et al. Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers[J]. Information Sciences, 2018,466: 44-54. |
[17] | 李顺东, 杨晓莉, 左祥建 ,等. 保护私有信息的图形相似判定[J]. 电子学报, 2017,45(9): 2184-2189. |
LI S D , YANG X L , ZUO X J ,et al. Privacy protecting similitude determination for graphics similarity[J]. Chinese Journal of Electronics, 2017,45(9): 2184-2189. | |
[18] | 李顺东, 杜润萌, 杨颜璟 ,等. 有理数相等的保密判定[J]. 电子学报, 2020,48(10): 1933-1937. |
LI S D , DU R M , YANG Y J ,et al. Privately determining equality of rational numbers[J]. Chinese Journal of Electronics, 2020,48(10): 1933-1937. | |
[19] | FREEDMAN M J , NISSIM K , PINKAS B . Efficient private matching and set intersection[C]// Advances in Cryptology- Eurocrypt. 2004: 1-19. |
[20] | LI S D , WANG D S , DAI Y Q . Symmetric cryptographic protocols for extended millionaires’ problem[J]. Science in China(Series F:Information Sciences), 2009,52(6): 974-982. |
[21] | 窦家维, 刘旭红, 王文丽 . 有理数域上两方集合的高效保密计算[J]. 计算机学报, 2020,43(8): 1397-1413. |
DOU J W , LIU X H , WANG W L . Privacy preserving two-party rational set computation[J]. Chinese Journal of Computers, 2020,43(8): 1397-1413. | |
[22] | HIDAKA A , SASAZUKI S , GOTO A ,et al. Plasma insulin,C-peptide and blood glucose and the risk of gastric cancer:the Ja pan public health center-based prospective study[J]. International Journal of Cancer Journal International Du Cancer, 2015,136(6): 1402-1410. |
[23] | LIU X , CHOO K K R , DENG R H ,et al. Efficient and privacy-preserving outsourced calculation of rational numbers[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(1): 27-39. |
[24] | 巩林明, 李顺东, 邵连合 ,等. 数轴上保密关系测定协议[J]. 软件学报, 2020,31(12): 3950-3967. |
GONG L M , LI S D , SHAO L H ,et al. Protocols for secure test on relationship on number axis[J]. Journal of Software, 2020,31(12): 3950-3967. | |
[25] | 窦家维, 王文丽, 刘旭红 ,等. 有理区间的安全多方计算与应用[J]. 电子学报, 2018,46(9): 2057-2062. |
DOU J W , WANG W L , LIU X H ,et al. Secure multiparty computation of rational interval and its applications[J]. Chinese Journal of Electronics, 2018,46(9): 2057-2062. |
[1] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[2] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[3] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[4] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[5] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[6] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[7] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[8] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[9] | Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI. Efficient and fully simulated oblivious transfer protocol on elliptic curve [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166. |
[10] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
[11] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[12] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[13] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[14] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[15] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|