隐匿顶点数和边数的保密图形相似性判定Private Graphic Similarity Estimating while Concealing the Number of Edges and Vertexes
于宝华;巩林明;
摘要(Abstract):
计算几何中的一些几何分析问题已成为安全多方几何计算领域的一个重要研究内容.保密平面图形间的安全相似性判定是安全几何计算中一个全新的研究领域,在保护地理信息系统以及社交网络中用户隐私方面有重要的理论价值和广阔的应用前景.本文的主要工作是基于同态加密方案构建隐匿图形顶点数和边数的两方保密图形相似性判定协议(当两个图形不相似时,该协议不会泄露参与双方私有图形的顶点数和边数),目前尚未见到关于这个问题的解决方案.
关键词(KeyWords): 保密向量运算;保密相似性判定;保密相等判定;安全多方几何计算
基金项目(Foundation): 兵团科技援疆专项课题(2014AB031-2);; 陕西省西安工程大学博士科研启动基金(107020311)
作者(Authors): 于宝华;巩林明;
DOI: 10.13568/j.cnki.651094.2018.03.012
参考文献(References):
- [1]Du W,Atallah M J.Secure multi-party computation problems and their applications:a review and open problems[C].Proceedings of the 2001 workshop on New security paradigms.ACM,2001:13-22.
- [2]Atallah M,Du W.Secure multi-party computational geometry[J].Algorithms and Data Structures,2001,2125(2):165-179.
- [3]Goldreich O.Foundations of cryptography:volume 2,basic applications[M].Cambridge university press,2009.
- [4]Katz J,Lindell Y.Introduction to modern cryptography[M].CRC Press,2014.
- [5]罗永龙,黄刘生,徐维江,等.一个保护私有信息的多边形相交判定协议[J].电子学报,2007,35(4):685-691.
- [6]Qin J,Duan H,Zhao H,et al.A new Lagrange solution to the privacy-preserving general geometric intersection problem[J].Journal of Network and Computer Applications,2014,46:94-99.
- [7]Wang Q,Luo Y,Huang L.Privacy-preserving protocols for finding the convex hulls[C].Availability,Reliability and Security,2008.ARES 08.Third International Conference on.IEEE,2008:727-732.
- [8]Sun M H,Luo S S,Xin Y,et al.Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection[J].Journal of China Institute of Communications,2013,34(1):30-42.
- [9]Li S D,Dai Y Q.Secure two-party computational geometry[J].Journal of Computer Science and Technology,2005,20(2):258-263.
- [10]Chen L,Lin B.Privacy-Preserving Point-Inclusion Two-Party Computation Protocol[C].Computational and Information Sciences(ICCIS),2013 Fifth International Conference on.IEEE,2013:257-260.
- [11]张静,罗守山,杨义先,等.保护私有信息的点包含协议研究[J].通信学报,2016,37(4):87-95.
- [12]Shundong L,Chunying W,Daoshun W,et al.Secure multiparty computation of solid geometric problems and their applications[J].Information Sciences,2014,282:401-413.
- [13]Wang B,Li M,Wang H.Geometric range search on encrypted spatial data[J].IEEE Transactions on Information Forensics and Security,2016,11(4):704-719.
- [14]Liu L,Chen X,Lou W.Secure three-party computational protocols for triangle area[J].International Journal of Information Security,2016,15(1):1-13.
- [15]巩林明,李顺东,窦家维,等.同态加密方案及安全两点直线计算协议[J].软件学报,2017,28(12):3274-3292.
- [16]Akavia A,La Vigne R,Moran T.Topology-Hiding Computation on all Graphs[J].IACR Cryptology e Print Archive,2017,2017:296.
- [17]张卫国,孙嫚,陈振华,等.空间位置关系的安全多方计算及其应用[J].电子与信息学报,2016,38(9):2294-2300.
- [18]陈振华,李顺东,黄琼,等.云外包计算中空间位置关系的保密判定[J].计算机学报,2017,40(2):351-363.
- [19]Yang B,Yang C H,Yu Y,et al.A Secure Scalar Product Protocol and Its Applications to Computational Geometry[J].JCP,2013,8(8):2018-2026.
- [20]王涛春,罗永龙,左开中,等.多边形相似判定中的私有信息保护[J].小型微型计算机系统,2012(2):383-387.
- [21]李顺东,杨晓莉,左祥建,等.保护私有信息的图形相似判定[J].电子学报,2017,45(09):2184-2189.
- [22]郭学让,汪烈军,葛潇艺.WSNs中基于Chebyshev多项式的可认证密钥协商方案[J].新疆大学学报(自然科学版),2015,32(1):6-10.
- [23]张永棠.基于代换加密的隐私保护协同过滤推荐算法[J].新疆大学学报(自然科学版),2017,34(4):446-451.
- [24]Choi S,Ghinita G,Bertino E.Secure mutual proximity zone enclosure evaluation[C].Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems.ACM,2014:133-142.
- [25]Mu B,Bakiras S.Private proximity detection for convex polygons[J].Tsinghua Science and Technology,2016,21(3):270-280.