计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2013年
12期
122-125
,共4页
解丹%杨波%邵志毅%徐彦蛟%杜军强
解丹%楊波%邵誌毅%徐彥蛟%杜軍彊
해단%양파%소지의%서언교%두군강
安全多方计算%两方数相等%半诚实模型%恶意模型%差错学习困难性问题%Paillier加密方案
安全多方計算%兩方數相等%半誠實模型%噁意模型%差錯學習睏難性問題%Paillier加密方案
안전다방계산%량방수상등%반성실모형%악의모형%차착학습곤난성문제%Paillier가밀방안
Security Multi-party Computation(SMC)%two-party numbers equality%semi-honesty model%malicious model%Learning With Error(LWE) difficulty problem%Paillier encryption scheme
保密地比较两方数是否相等是安全多方计算(SMC)问题中重要的研究内容,其在数据挖掘、在线推荐服务、在线预定服务、医药数据库等领域有着重要应用。针对半诚实模型下两方保密比较协议无法抵抗恶意攻击的问题,提出一种恶意模型下两方数相等的保密计算协议,采用基于格上差错学习(LWE)困难性问题的公钥加密机制和Paillier加密方案,使得存在恶意攻击者的情况下能够阻止恶意攻击行为发生,同时证明协议在恶意模型下是安全的。分析结果表明,该协议执行完成后不会泄露通信双方的私有信息,与半诚实模型下两方保密比较协议相比,能有效抵抗恶意攻击者的攻击,为SMC通信提供了较好的解决方案。
保密地比較兩方數是否相等是安全多方計算(SMC)問題中重要的研究內容,其在數據挖掘、在線推薦服務、在線預定服務、醫藥數據庫等領域有著重要應用。針對半誠實模型下兩方保密比較協議無法牴抗噁意攻擊的問題,提齣一種噁意模型下兩方數相等的保密計算協議,採用基于格上差錯學習(LWE)睏難性問題的公鑰加密機製和Paillier加密方案,使得存在噁意攻擊者的情況下能夠阻止噁意攻擊行為髮生,同時證明協議在噁意模型下是安全的。分析結果錶明,該協議執行完成後不會洩露通信雙方的私有信息,與半誠實模型下兩方保密比較協議相比,能有效牴抗噁意攻擊者的攻擊,為SMC通信提供瞭較好的解決方案。
보밀지비교량방수시부상등시안전다방계산(SMC)문제중중요적연구내용,기재수거알굴、재선추천복무、재선예정복무、의약수거고등영역유착중요응용。침대반성실모형하량방보밀비교협의무법저항악의공격적문제,제출일충악의모형하량방수상등적보밀계산협의,채용기우격상차착학습(LWE)곤난성문제적공약가밀궤제화Paillier가밀방안,사득존재악의공격자적정황하능구조지악의공격행위발생,동시증명협의재악의모형하시안전적。분석결과표명,해협의집행완성후불회설로통신쌍방적사유신식,여반성실모형하량방보밀비교협의상비,능유효저항악의공격자적공격,위SMC통신제공료교호적해결방안。
The equation test is an important part in Security Multi-party Computation(SMC). It has important application in the fields of data mining, recommendation service, online dating service, and medical database. According to the defects existing in the protocols of comparing two data based on security under the semi-honesty model, this paper proposes a secure computation protocol for two-party numbers equality test in the malicious model. The protocol uses the public-key encryption mechanism based on lattice Learning With Error(LWE) difficult problem and Paillier encryption scheme, it can prevent malicious attacks in the case of existing malicious attacker, and at the same time proves that agreement is safe under the malicious model. Analysis results prove that the protocol after the implementation is completed, and no private information in both communication parties is revealed. Compared with the protocols of comparing two data based on security under the semi-honesty model, the proposed protocol can effectively resist the attacks from the malicious adversary and provides a good solution for the communication with high needs.