天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 軟件論文 >

卷積隱藏技術(shù)下的安全雙方計(jì)算模型的安全性與復(fù)雜性分析

發(fā)布時(shí)間:2018-11-05 21:09
【摘要】:安全雙方計(jì)算是指兩個(gè)互相不信任的參與方之間在保護(hù)各自隱私的前提下協(xié)同參與計(jì)算,計(jì)算結(jié)果使得每一個(gè)參與方都能得到正確的輸出,同時(shí)每一方只能得到自己的輸入和輸出,而不了解其他方的輸入和輸出。安全雙方計(jì)算實(shí)際上是網(wǎng)絡(luò)用戶之間的一種分布式協(xié)議,它能夠使用戶在不泄漏各自的私人輸入的同時(shí)完成合作計(jì)算的任務(wù)。經(jīng)典的安全雙方問(wèn)題一直專注于零信息泄露的模式,雖然這是理想的安全雙方模型,但在實(shí)際的安全雙方計(jì)算中需要花費(fèi)較大且效率不高。本文在傳統(tǒng)安全雙方的問(wèn)題上利用卷積隱藏技術(shù)構(gòu)建了卷積安全雙方計(jì)算問(wèn)題并基于此問(wèn)題建立了第三方參與的卷積安全雙方計(jì)算模型和需要部分信息公開(kāi)情況下的安全雙方計(jì)算模型,并對(duì)該模型進(jìn)行安全性與復(fù)雜性的評(píng)估,提供了一種可以根據(jù)參與者對(duì)安全的容忍程度來(lái)調(diào)節(jié)安全和效率的方法。主要內(nèi)容如下:1.研究了幾個(gè)基本的安全雙方求和與乘積問(wèn)題,提出了相應(yīng)的協(xié)議并對(duì)協(xié)議安全性與復(fù)雜性進(jìn)行了分析。然后在傳統(tǒng)安全雙方計(jì)算問(wèn)題的基礎(chǔ)上,考慮參與者數(shù)據(jù)是一組n維數(shù)列的情況,提出了卷積安全雙方計(jì)算問(wèn)題。2.基于卷積安全雙方計(jì)算問(wèn)題建立了第三方參與的安全雙方計(jì)算模型,并構(gòu)造了兩種不同安全需求情況下的實(shí)現(xiàn)協(xié)議,對(duì)協(xié)議的安全性與復(fù)雜性進(jìn)行了分析,討論了犧牲安全性提高參與者之間計(jì)算效率的可行性。3.提出了一種簡(jiǎn)單的復(fù)雜性量化標(biāo)準(zhǔn),對(duì)卷積問(wèn)題的不同協(xié)議的復(fù)雜性進(jìn)行了分析與量化,提供了一種可以根據(jù)參與者對(duì)安全性需求來(lái)選擇合理協(xié)議的方法。
[Abstract]:The calculation of security parties means that two parties who have no confidence in each other are involved in the calculation under the premise of protecting their privacy. The result of the calculation enables each participant to get the correct output. At the same time, each party can only get their own input and output, and do not understand the other side of the input and output. Secure two-party computing is actually a distributed protocol between network users, which enables users to complete the task of cooperative computing without revealing their personal input. The classical security side problem has been focused on the zero information leakage model. Although it is an ideal security two sides model, it needs to be expensive and inefficient in the actual computation of security parties. In this paper, we use convolutional hiding technology to construct the computing problem of convolutional security parties on the traditional security sides. Based on this problem, we establish the computing model of convolutional security parties with the participation of third parties and the disclosure of some information needed. The two sides of the security calculation model, The security and complexity of the model are evaluated to provide a method to adjust the safety and efficiency according to the tolerance of the participants to security. The main contents are as follows: 1. In this paper, several basic security summation and product problems are studied, and the corresponding protocols are proposed, and the security and complexity of the protocols are analyzed. Then, on the basis of the traditional security two-party calculation problem, considering that the participant data is a set of n-dimensional series, the convolution security two-party computation problem is proposed. 2. Based on the computation problem of convolutional security parties, the security parties' computing model with the participation of third parties is established, and two kinds of implementation protocols under different security requirements are constructed, and the security and complexity of the protocols are analyzed. The feasibility of sacrificing security to improve computational efficiency between participants is discussed. This paper presents a simple complexity quantization standard, analyzes and quantifies the complexity of different protocols for convolution problems, and provides a method for selecting reasonable protocols according to the security requirements of participants.
【學(xué)位授予單位】:貴州大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309
,

本文編號(hào):2313474

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2313474.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶3c702***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com