天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于安全多方計(jì)算的若干問題研究

發(fā)布時(shí)間:2019-05-20 08:43
【摘要】:在網(wǎng)絡(luò)信息技術(shù)快速發(fā)展的今天,海量的數(shù)據(jù)資源被共享,信息安全問題逐漸成為人們關(guān)注的熱點(diǎn)話題。一方面,企業(yè)和組織機(jī)構(gòu)在發(fā)展的過程中需要保密自己的有價(jià)值數(shù)據(jù),另一方面又要通過合作完成一些計(jì)算,獲得利益。在此背景下安全多方計(jì)算(Secure Multi-party Computation, SMC)應(yīng)運(yùn)而生,最早由A.C YAO在1982年提出。安全多方計(jì)算一經(jīng)提出就在密碼學(xué)研究領(lǐng)域中占據(jù)重要的位置,有著廣泛的研究和應(yīng)用領(lǐng)域。 在本文中,主要研究的是安全多方計(jì)算眾多領(lǐng)域的一種——基于隱私保護(hù)的計(jì)算幾何。隱私保護(hù)的計(jì)算幾何的研究問題也比較多,之前的眾多學(xué)者對(duì)該研究取得了驕傲的成果。所以在本文中,我們總結(jié)了前人的成果,同時(shí)在前輩的基礎(chǔ)上,提出一些新的研究成果。主要工作如下: 1.主要介紹了安全多方計(jì)算的一些基本知識(shí),包括問題的提出、研究的背景意義和在工程中的應(yīng)用領(lǐng)域。我們對(duì)安全多方計(jì)算的研究做了分析和總結(jié),介紹了安全多方計(jì)算的一些基本密碼學(xué)基礎(chǔ)以及部分基礎(chǔ)協(xié)議。主要包括安全多方計(jì)算的安全定義、參與方模型、安全性定義、同態(tài)加密、秘密分享、零知識(shí)證明、安全比較協(xié)議、點(diǎn)積協(xié)議以及不經(jīng)意傳輸?shù)取?2.我們的重點(diǎn)目標(biāo)是要得出線段與圓的保密關(guān)系判定,但是在提出此協(xié)議之前我們需要一些基本的協(xié)議和定理。接著我們提出了新的安全的點(diǎn)線、點(diǎn)圓位置關(guān)系的判定協(xié)議,并證明了其正確性和安全性。再然后利用之前介紹及提出的協(xié)議,提出了線段與圓的安全協(xié)議,對(duì)協(xié)議做分析,并證明了該協(xié)議的正確性和安全性。 3.提出基于隱私保護(hù)的n-凸多邊形面積計(jì)算的保密協(xié)議,由三角形坐標(biāo)面積公式推出了n-凸多邊形的面積公式。基于茫然第三方和同態(tài)加密方案提出了凸多邊形面積安全計(jì)算協(xié)議以及容忍惡意模型下的安全n-凸多邊形的面積計(jì)算協(xié)議并對(duì)協(xié)議從正確性、安全性以及復(fù)雜性三個(gè)方面做了分析。
[Abstract]:With the rapid development of network information technology, massive data resources are shared, and information security has gradually become a hot topic. On the one hand, enterprises and organizations need to keep their own valuable data confidential in the process of development, on the other hand, they should complete some calculations through cooperation to obtain benefits. In this context, secure multi-party computing (Secure Multi-party Computation, SMC) emerges as the times require, which was first proposed by A.C YAO in 1982. As soon as secure multi-party computing is proposed, it occupies an important position in the field of cryptography research, and has a wide range of research and application fields. In this paper, we mainly study the computational geometry based on privacy protection, which is a kind of secure multi-party computing. There are many problems in computational geometry of privacy protection, and many scholars have made proud achievements in this research. Therefore, in this paper, we summarize the previous results, and at the same time, on the basis of the previous generation, put forward some new research results. The main work is as follows: 1. This paper mainly introduces some basic knowledge of secure multi-party computing, including the putting forward of the problem, the background significance of the research and the application field in engineering. We analyze and summarize the research of secure multi-party computing, and introduce some basic cryptography basis and some basic protocols of secure multi-party computing. It mainly includes the security definition of secure multi-party computing, participant model, security definition, homomorphism encryption, secret sharing, zero knowledge proof, security comparison protocol, dot product protocol and inadvertent transmission. 2. Our key goal is to determine the confidentiality relationship between line segments and circles, but before we propose this protocol, we need some basic protocols and theorem. Then we propose a new secure protocol for determining the relationship between point line and point circle position, and prove its correctness and security. Then, by using the protocol introduced and proposed earlier, the security protocol of line segment and circle is proposed, the protocol is analyzed, and the correctness and security of the protocol are proved. 3. A confidentiality protocol for calculating the area of n-convex polygons based on privacy protection is proposed. The area formula of n-convex polygons is derived from the triangular coordinate area formula. Based on the blank third party and homomorphism encryption scheme, the area security calculation protocol of convex polygons and the area calculation protocol of secure n-convex polygons under malicious model are proposed and correct. The security and complexity are analyzed.
【學(xué)位授予單位】:云南大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 劉文;羅守山;陳萍;;保護(hù)私有信息的點(diǎn)線關(guān)系判定協(xié)議及其應(yīng)用[J];北京郵電大學(xué)學(xué)報(bào);2008年02期

2 羅守山;廖干才;劉文;;保護(hù)私有信息的三角不等式判定協(xié)議及其應(yīng)用[J];北京郵電大學(xué)學(xué)報(bào);2009年01期

3 劉文;羅守山;楊義先;辛陽;肖倩;;安全兩方圓計(jì)算協(xié)議[J];北京郵電大學(xué)學(xué)報(bào);2009年03期

4 羅永龍;黃劉生;徐維江;荊巍巍;;一個(gè)保護(hù)私有信息的多邊形相交判定協(xié)議[J];電子學(xué)報(bào);2007年04期

5 羅文俊,李祥;雙向零知識(shí)證明與初等函數(shù)兩方保密計(jì)算[J];貴州大學(xué)學(xué)報(bào)(自然科學(xué)版);2004年01期

6 羅永龍;黃劉生;荊巍巍;徐維江;;空間幾何對(duì)象相對(duì)位置判定中的私有信息保護(hù)[J];計(jì)算機(jī)研究與發(fā)展;2006年03期

7 向廣利,陳莘萌,馬捷,張俊紅;實(shí)數(shù)范圍上的同態(tài)加密機(jī)制[J];計(jì)算機(jī)工程與應(yīng)用;2005年20期

8 羅永龍;黃劉生;荊巍巍;徐維江;陳國(guó)良;;保護(hù)私有信息的叉積協(xié)議及其應(yīng)用[J];計(jì)算機(jī)學(xué)報(bào);2007年02期

9 李伙穆;陳其明;顏慶陸;;不規(guī)則多邊形面積計(jì)算公式的證明及應(yīng)用[J];黎明職業(yè)大學(xué)學(xué)報(bào);2008年01期

10 李順東;戴一奇;王道順;羅平;;幾何相交問題的多方保密計(jì)算[J];清華大學(xué)學(xué)報(bào)(自然科學(xué)版);2007年10期



本文編號(hào):2481512

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2481512.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶fa4cf***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com