首页|恶意模型下集合交集问题的保密计算

恶意模型下集合交集问题的保密计算

扫码查看
研究集合问题是安全多方问题的基础,当前已有的协议在处理集合问题时,不能保证集合运算的隐私性和正确性,且都是在全集范围下取值,导致应用范围受限,容易受到恶意敌手的攻击,安全性较低.因此,将集合是否存在交集问题转化为集合元素相减问题,并且基于高效的椭圆曲线加密方案,设计了一种半诚实模型下无全集限制求集合交集的保密计算协议.然后借助密码学工具设计了恶意模型下无全集限制求集合交集的保密计算协议.协议可以更好地抵御恶意攻击,且参与方无法通过观察结果推断出其他参与方的信息.这有助于提高整个协议的安全性.此外,该协议的计算复杂度和通信复杂度也低于其它现有同类型协议.
Secure computing of set intersection problems in malicious models
The study of set problems serves as the foundation for secure multi-party computations.However,existing protocols,when dealing with set intersection problems,fail to ensure the privacy and correctness of set operations and are limited to values within the entire set range.These problems result in limited application scope and vulnerability to attacks by malicious adversaries,leading to low security.To address this issue,we transformed the problem of determining the existence of a set intersection into one of set element subtraction.Based on an efficient elliptic curve encryption scheme,a secure computing protocol was designed to find the set intersec-tion of sets without full set constraints in a semi-honest model.Furthermore,with the assistance of cryptographic tools,we developed a secure computation protocol for finding set intersections without full set constraints under malicious models.This new protocol can en-hance resistance to malicious attacks.It can also prevent participants from inferring information about other participants through observ-ing results,thereby improving the overall security of the protocol.Moreover,the computational and communication complexity of our protocol is lower than that of other existing protocols of the same type.

secure multi-party computationintersection of setselliptic curve encryptionCut-and-Choosereal/ideal model paradigm

王茹雪、刘新、叶蔚

展开 >

内蒙古科技大学数智产业学院,内蒙古包头 014010

中国航天科工集团第二研究院北京计算机技术及应用研究所,北京 100039

安全多方计算 集合交集 椭圆曲线加密 分割-选择 理想-实际范例

国家自然科学基金国家自然科学基金

7229358352293580

2024

内蒙古科技大学学报
内蒙古科技大学

内蒙古科技大学学报

影响因子:0.247
ISSN:2095-2295
年,卷(期):2024.43(3)
  • 4