Journal on Communications ›› 2014, Vol. 35 ›› Issue (11): 107-116.doi: 10.11959/j.issn.1000-436x.2014.11.012

• security protocol • Previous Articles     Next Articles

GUC-secure protocol for private relational join operator computing

Yuan TIAN,Rong-xin SUN,Wu-yang CAI   

  1. Software School,Dalian University of Technology,Dalian 116620,China
  • Online:2014-11-25 Published:2017-06-20
  • Supported by:
    The National Natural Science Foundation of China

Abstract:

It is one of important applications of secure multiparty computation that privacy-preserving SQL computation in distributed relational database.There are only few works dealing with provably-secure privacy-preserving data manipulations in contrast with comparatively abundant works on privacy-preserving data-query in database,among which the join operator is the most powerful in generating new data (relation).By making use of anonymous IBE (identity-based encryption) scheme and its user private-keys blind generation techniques,a very general cryptographic protocol framework is proposed for secure 2-party join computation.This construction is provably GUC (generalized universally composable) secure in the standard model with acceptable efficiency.

Key words: secure multiparty computation, GUC security, distributed relational database, join

No Suggested Reading articles found!