Three basic information-theoretic secure protocols foroutsourcing computing and privacy-preservingdetermination of spatial location-relation Click Copy

Three basic information-theoretic secure protocols foroutsourcing computing and privacy-preservingdetermination of spatial location-relation

References:

[1] Yao A C.Protocols for secure computations[C]//Proceedings of 23rd IEEE Symposium on Foundations of Computer Science,Chicago,USA,1982:160-164. [2]Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1026-1037. [3]杨 静,赵家石,张健沛.一种面向高维数据挖掘的隐私保护方法[J].电子学报,2013(11):2187-2192. YANG Jing,ZHAO Jia-shi,ZHANG Jian-pei.A privacy preservation method for high dimensional data mining[J].Acta Electronica Sinica,2013(11):2187-2192. [4]Kenthapadi K,Mironov I,Thakurta A.Privacy-preserving data mining in industry[C]//Companion Proceedings of the 2019 World Wide Web Conference.ACM,2019:1308-1310. [5]Kamm L,Bogdanov D,Pankova A,et al.Statistical analysis methods using secure multi-party computation[J].Cryptology and Information Security Series,2015,(13):58-80. [6]Duverle D A,Kawasaki S,Yamada Y,et al.Privacy-preserving statistical analysis by exact logistic regression[C]//IEEE Symposium on Security and Privacy,2015. [7]Wen L D,Atallah M J.Secure multi-party computation problems and their applications:a review and open problems[C]//New Security Paradigms Workshop,ACM,2001:13-22. [8]Mohassel P,Zhang Y.Secure M L:A system for scalable privacy-preserving machine learning[C]//IEEE Symposium on Security and Privacy,2017:19-38. [9]Dowlin N,Giladbachrach R,Laine K,et al.CryptoNets:applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning,2016:201-210. [10]Mohassel P,Rindal P.ABY3:a mixed protocol framework for machine learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,ACM,2018:35-52. [11]Jung T,Mao X F,Li X Y,et al.Privacy-preserving data aggregation without secure channel:Multivariate polynomial evaluation[C]//INFOCOM,2013 Proceedings IEEE.IEEE,2013:2634-2642. [12]Groat M M,Hey W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggre-gation in wireless sensor networks[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:2024-2032. [13]Ozdemir S,Peng M,Xiao Y.PRDA:polynomial regression-based privacy-preserving data aggregation for wireless sensor networks[J].Wireless Communications and Mobile Computing,2015,15(4):615-628. [14]Liu Y,Guo W,Fan C I,et al.A practical privacy-preserving data aggregation(3PDA)scheme for smart grid[J].IEEE Transactions on Industrial Informatics,2018,15(3):1767-1774. [15]Huang J J,Juang W S,Fan C I,et al.Robust and privacy protection authentication in cloud computing[J].International Journal of Innovative Computing,Information and Control,2013,9(11):4247-4261. [16]Wei L,Zhu H,Cao Z,et al.Security and privacy for storage and computation in cloud computing[J].Information Sciences,2014,258:371-386. [17]Yang D,Chen Y C,Ye S.Privacy-preserving outsource computing for binary vector similarity[C]//International Conference on Security with Intelligent Computing and Big-data Services.Springer,Cham,2017:161-169. [18]Samanthula B K,Elmehdwi Y,Howser G,et al.A secure data sharing and query processing framework via federation of cloud computing[J].Information Systems,2015,48:196-212. [19]Campos R,Dias G,Jorge A M,et al.Survey of temporal information retrieval and relatd applications[J].ACM Computing Surveys(CSUR),2015,47(2):15. [20]周素芳,窦家维,郭奕旻,等.安全多方向量计算[J].计算机学报,2017(5):1134-1150. ZHOU Su-fang,DOU Jia-wei,GUO Yi-min,et al.Secure multiparty vector computation[J].Chinese Journal of Computers,2017,40(5):1134-1150. [21]陈振华,李顺东,黄 琼,等.云外包计算中空间位置关系的保密判定[J].计算机学报,2017,40(2):351-363. CHEN Zhen-hua,LI Shun-dong,HUANG Qiong,et al.Privacy-preserving determination of spatial location-relation in cloud computing[J].Chinese Journal of Computers,2017,40(2):351-363. [22]张卫国,孙 嫚,陈振华,等.空间位置关系的安全多方计算及其应用[J].电子与信息学报,2016,38(9):2294-2300. ZHANG Wei-guo,SUN Man,CHEN Zhen-hua,et al.Secure multi-party computation of spatial relationship and its application[J].Journal of Electronics & Information Technology,2016,38(9):2294-2300. [23]Li S D,Wu C Y,Wang D S.Secure multiparty computation of solid geometric problems and their applications[J].Information Sciences,2014,282(10):401-413. [24]荆巍巍.安全多方计算中若干基础协议及应用的研究[D].北京:中国科学技术大学,2008. JING Wei-wei.Research on several basic protocols and application of secure multi-party computation[D].Beijing:University of Science and Technology of China,2008. [25]Katz J, Lindell Y.Introduction to modern cryptography[M].BocaRaton Florida:Chapman and Hall/CRC,2014. [26]Guo F,Susilo W,Mu Y.Introduction to security reduction[M].NewYork:Springer,2018. [27]Goldreich O.Foundations of cryptography:basic applications[M].London:Cambridge University Press,2004. [28]Goldreich O,Micali S,Wigderson A.How to play any mental game[C]//Proceedings of the nineteenth annual ACM symposium on Theory of computing.ACM,1987:218-229. [29]Hazay C,Lindell Y.Efficient secure two-party protocols:Techniques and constructions[M].NewYork:Springer Science & Business Media,2010. [30]Lin H Y,Tzeng W G.An efficient solution to the millionaires'problem based on homomorphic encryption[C]//International Conference on Applied Cryptography and Network Security,Springer,Berlin,Heidelberg,2005,3531:456-466.

Memo

收稿日期:2019-05-20 责任编辑:高 佳
基金项目:国家自然科学基金(61872289); 广西密码学与信息安全重点实验室开放课题(GCIS201714)
通信作者:黄路琪(1996-),女,山东平阴人,硕士研究生,E-mail:huangluqi_xust@163.com