CHEN Zhen-hua,HUANG Lu-qi,SHI Xiao-nan,et al.Three basic information-theoretic secure protocols foroutsourcing computing and privacy-preservingdetermination of spatial location-relation[J].Journal of Xi'an University of Science and Technology,2019,(06):1049-1056.





Three basic information-theoretic secure protocols foroutsourcing computing and privacy-preservingdetermination of spatial location-relation
(1.西安科技大学 计算机科学与技术学院,陕西 西安 710054; 2.桂林电子科技大学 广西密码学与信息安全重点实验室,广西 桂林 541004)
CHEN Zhen-hua12HUANG Lu-qi1SHI Xiao-nan1NIE Jing-jing1
(1.College of Computer Science and Technology,Xi'an University of Science and Technology,Xi'an 710054,China; 2.Guangxi Key Laboratory of Cryptography and Information Security,Guilin University of Electronic Technology,Guilin 541004,China)
安全多方计算 外包计算 内积协议 空间位置 信息论安全
secure multi-party computation outsourcing computing inner product protocol spatial location information-theoretic security
TP 309
现存的安全几何计算协议大多采用公钥加密方法保护数据隐私,计算成本较大。当计算能力不强的用户解决复杂问题时,效率往往较低。针对这些问题,避开公钥加密的方法,而是利用矩阵论中一些特殊函数的性质和随机数混淆的方法来保护数据隐私,并且为了进一步提高效率,将大量的用户计算外包出去。在此基础上,首先设计了常用的3个基础向量外包计算协议,分别是安全外包计算的向量模长计算协议,向量内积计算协议和向量夹角计算协议,并利用模拟范例证明了协议的安全性,然后利用这3个基础协议进一步解决了现实意义中如何保密判断空间面与面位置关系的问题,并给出了具体协议。最后,通过理论分析与实验仿真显示:由于协议没有使用公钥加密的方法,因此达到了信息论安全; 并且由于外包计算的使用,为用户节省了更多的计算成本,取得了比较高的效率; 此外,协议能够解决的问题也更加广泛,可作为新的云计算技术的基础协议应用到安全多方计算的其它分支中。
The existing protocols for secure geometric computation mainly make use of the public key encryption to protect the privacy of data,which is more costly.And there arises a problem of inefficiency for the users weak in computing power solve complicated problems.Aiming at these drawbacks,this paper combines the properties of some special functions in matrix theory with the random number to protect the data's privacy instead of the public key encryption.In the meanwhile,numerous computation tasks are also outsourced in order to further improve the performance.On the basis of these techniques,we first design three basic protocols for vector calculation,including security outsourcing calculation of vector length,vector inner product,and vector angle with the security of our protocols proved with simulation paradigm.Then we employ them to privately determine the spatial location-relation of plane and the plane in the sense of real life.Finally,the analysis and comparison under theory and simulation experiments shows that our protocols achieve the information-theoretic security and a higher efficiency because of using the outsourcing computing rather than the public key encryption,as well as they can be applicable to solve more problems than the previous ones.The proposed protocols in this paper as the new techniques of cloud computing can be used in building-blocks in secure multi-party computation.


[1] Yao A C.Protocols for secure computations[C]//Proceedings of 23rd IEEE Symposium on Foundations of Computer Science,Chicago,USA,1982:160-164. [2]Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1026-1037. [3]杨 静,赵家石,张健沛.一种面向高维数据挖掘的隐私保护方法[J].电子学报,2013(11):2187-2192. YANG Jing,ZHAO Jia-shi,ZHANG Jian-pei.A privacy preservation method for high dimensional data mining[J].Acta Electronica Sinica,2013(11):2187-2192. [4]Kenthapadi K,Mironov I,Thakurta A.Privacy-preserving data mining in industry[C]//Companion Proceedings of the 2019 World Wide Web Conference.ACM,2019:1308-1310. [5]Kamm L,Bogdanov D,Pankova A,et al.Statistical analysis methods using secure multi-party computation[J].Cryptology and Information Security Series,2015,(13):58-80. [6]Duverle D A,Kawasaki S,Yamada Y,et al.Privacy-preserving statistical analysis by exact logistic regression[C]//IEEE Symposium on Security and Privacy,2015. [7]Wen L D,Atallah M J.Secure multi-party computation problems and their applications:a review and open problems[C]//New Security Paradigms Workshop,ACM,2001:13-22. [8]Mohassel P,Zhang Y.Secure M L:A system for scalable privacy-preserving machine learning[C]//IEEE Symposium on Security and Privacy,2017:19-38. [9]Dowlin N,Giladbachrach R,Laine K,et al.CryptoNets:applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning,2016:201-210. [10]Mohassel P,Rindal P.ABY3:a mixed protocol framework for machine learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,ACM,2018:35-52. [11]Jung T,Mao X F,Li X Y,et al.Privacy-preserving data aggregation without secure channel:Multivariate polynomial evaluation[C]//INFOCOM,2013 Proceedings IEEE.IEEE,2013:2634-2642. [12]Groat M M,Hey W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggre-gation in wireless sensor networks[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:2024-2032. [13]Ozdemir S,Peng M,Xiao Y.PRDA:polynomial regression-based privacy-preserving data aggregation for wireless sensor networks[J].Wireless Communications and Mobile Computing,2015,15(4):615-628. [14]Liu Y,Guo W,Fan C I,et al.A practical privacy-preserving data aggregation(3PDA)scheme for smart grid[J].IEEE Transactions on Industrial Informatics,2018,15(3):1767-1774. [15]Huang J J,Juang W S,Fan C I,et al.Robust and privacy protection authentication in cloud computing[J].International Journal of Innovative Computing,Information and Control,2013,9(11):4247-4261. [16]Wei L,Zhu H,Cao Z,et al.Security and privacy for storage and computation in cloud computing[J].Information Sciences,2014,258:371-386. [17]Yang D,Chen Y C,Ye S.Privacy-preserving outsource computing for binary vector similarity[C]//International Conference on Security with Intelligent Computing and Big-data Services.Springer,Cham,2017:161-169. [18]Samanthula B K,Elmehdwi Y,Howser G,et al.A secure data sharing and query processing framework via federation of cloud computing[J].Information Systems,2015,48:196-212. [19]Campos R,Dias G,Jorge A M,et al.Survey of temporal information retrieval and relatd applications[J].ACM Computing Surveys(CSUR),2015,47(2):15. [20]周素芳,窦家维,郭奕旻,等.安全多方向量计算[J].计算机学报,2017(5):1134-1150. ZHOU Su-fang,DOU Jia-wei,GUO Yi-min,et al.Secure multiparty vector computation[J].Chinese Journal of Computers,2017,40(5):1134-1150. [21]陈振华,李顺东,黄 琼,等.云外包计算中空间位置关系的保密判定[J].计算机学报,2017,40(2):351-363. CHEN Zhen-hua,LI Shun-dong,HUANG Qiong,et al.Privacy-preserving determination of spatial location-relation in cloud computing[J].Chinese Journal of Computers,2017,40(2):351-363. [22]张卫国,孙 嫚,陈振华,等.空间位置关系的安全多方计算及其应用[J].电子与信息学报,2016,38(9):2294-2300. ZHANG Wei-guo,SUN Man,CHEN Zhen-hua,et al.Secure multi-party computation of spatial relationship and its application[J].Journal of Electronics & Information Technology,2016,38(9):2294-2300. [23]Li S D,Wu C Y,Wang D S.Secure multiparty computation of solid geometric problems and their applications[J].Information Sciences,2014,282(10):401-413. [24]荆巍巍.安全多方计算中若干基础协议及应用的研究[D].北京:中国科学技术大学,2008. JING Wei-wei.Research on several basic protocols and application of secure multi-party computation[D].Beijing:University of Science and Technology of China,2008. [25]Katz J, Lindell Y.Introduction to modern cryptography[M].BocaRaton Florida:Chapman and Hall/CRC,2014. [26]Guo F,Susilo W,Mu Y.Introduction to security reduction[M].NewYork:Springer,2018. [27]Goldreich O.Foundations of cryptography:basic applications[M].London:Cambridge University Press,2004. [28]Goldreich O,Micali S,Wigderson A.How to play any mental game[C]//Proceedings of the nineteenth annual ACM symposium on Theory of computing.ACM,1987:218-229. [29]Hazay C,Lindell Y.Efficient secure two-party protocols:Techniques and constructions[M].NewYork:Springer Science & Business Media,2010. [30]Lin H Y,Tzeng W G.An efficient solution to the millionaires'problem based on homomorphic encryption[C]//International Conference on Applied Cryptography and Network Security,Springer,Berlin,Heidelberg,2005,3531:456-466.


[1]张卫国,陈 娓,孙 嫚.高维空间平行四边形面积的多方保密计算[J].西安科技大学学报,2016,(05):697.[doi:10.13800/j.cnki.xakjdxxb.2016.0515]
 ZHANG Wei-guo,CHEN Wei,SUN Man.Secure multi-party computation of high-dimensional spatial parallelogram area[J].Journal of Xi'an University of Science and Technology,2016,(06):697.[doi:10.13800/j.cnki.xakjdxxb.2016.0515]


收稿日期:2019-05-20 责任编辑:高 佳
基金项目:国家自然科学基金(61872289); 广西密码学与信息安全重点实验室开放课题(GCIS201714)
更新日期/Last Update: 2019-12-20