电子学报 ›› 2021, Vol. 49 ›› Issue (1): 50-57.DOI: 10.12263/DZXB.20191263

• 学术论文 • 上一篇    下一篇

区间关系保密计算若干问题研究

窦家维, 王颖囡, 葛雪   

  1. 陕西师范大学数学与信息科学学院, 陕西西安 710062
  • 收稿日期:2019-11-11 修回日期:2020-07-12 出版日期:2021-01-25
    • 作者简介:
    • 窦家维 女,1963年出生,陕西西安人.副教授、硕士生导师.分别在陕西师范大学、西安交通大学获得硕士学位、博士学位.主要研究方向为应用数学和密码学.E-mail:jiawei@snnu.edu.cn;王颖囡 女,1996年出生,河南三门峡人.现为陕西师范大学硕士生.主要研究方向为应用数学和密码学.E-mail:wangyingnan@snnu.edu.cn;葛雪 女,1995年出生,山西运城人.现为陕西师范大学硕士生.主要研究方向为应用数学和密码学.
    • 基金资助:
    • 国家自然科学基金 (No.61272435)

Some Research on Secure Interval Relation Computation

DOU Jia-wei, WANG Ying-nan, GE Xue   

  1. School of Mathematics and Information Science, Shaanxi Normal University, Xi'an, Shaanxi 710062, China
  • Received:2019-11-11 Revised:2020-07-12 Online:2021-01-25 Published:2021-01-25
    • Supported by:
    • National Natural Science Foundation of China (No.61272435)

摘要: 安全多方计算是密码学界的一个重要研究方向,本文主要研究区间的安全计算问题.首先应用Paillier加密方案设计"点与区间"以及"区间与区间"关系两方保密计算基础协议,协议的特点是判定结果以密文形式输出.将其推广为有理区间关系判定协议时,相比已有协议,本文协议更为安全与高效.在此基础上,进一步研究多维度的"点与区间"以及"区间与区间"关系阈值判定这一类新问题.由于基础协议的输出结果为密文,故以此为基础所设计的多维度问题协议更加安全.最后,应用模拟范例方法严格证明了协议的安全性,并对协议进行了效率分析及模拟实验,理论分析及实验结果都说明本文协议是高效的.

 

关键词: 密码学, 两方安全计算, 点与区间关系, 区间与区间关系, 阈值问题

Abstract: Secure multi-party computation (SMC) is an important research direction of cryptography. In this paper, we study the secure computation of intervals. Using the Paillier encryption scheme, we design the protocols of relationship between an interval and a point (or an interval). Firstly, the outputs of protocols are ciphertexts. If we extend it to rational intervals, the protocols are safer and more efficient than existing protocols. And then, we study the multi-dimensional problems, that is, the threshold problems of multiple points (or intervals) and intervals, which are new problems in SMC. Since the outputs of the basic protocols are ciphertexts, the multi-dimensional problem protocols are more secure. We strictly prove the security of the protocols using the simulation paradigm method, analyze and demonstrate the efficiency of the protocols through experiments, and compare with the related work to illustrate that the protocols are efficient.

 

Key words: cryptography, secure two-party computation, relationship between point and interval, relationship between interval and interval, threshold problem

中图分类号: