• 
    

    
    

      99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

      安全多方計(jì)算技術(shù)專欄序言(中英文)

      2019-12-29 09:47:41徐秋亮唐春明
      密碼學(xué)報(bào) 2019年2期
      關(guān)鍵詞:同態(tài)計(jì)算技術(shù)保密

      徐秋亮,唐春明

      1.山東大學(xué) 軟件學(xué)院,濟(jì)南 250101

      2.廣州大學(xué) 數(shù)學(xué)與信息科學(xué)學(xué)院,廣州 510006

      安全多方計(jì)算研究?jī)蓚€(gè)或多個(gè)持有私有輸入的參與者,聯(lián)合計(jì)算某些功能函數(shù),各自得到他們預(yù)定的輸出,并達(dá)到正確性、隱私性、公平性等安全特性.近年來(lái),隨著云計(jì)算、大數(shù)據(jù)、人工智能、區(qū)塊鏈等技術(shù)的出現(xiàn)和發(fā)展,數(shù)據(jù)安全與隱私保護(hù)問題面臨的挑戰(zhàn)日益突出,安全多方計(jì)算被寄予厚望,公認(rèn)是解決這類問題的重要手段,因而得到空前重視.

      為了進(jìn)一步促進(jìn)我國(guó)安全多方計(jì)算領(lǐng)域的理論和應(yīng)用研究,本刊通過廣泛征稿和約稿,組織了本期“安全多方計(jì)算技術(shù)” 專欄,希望能對(duì)該領(lǐng)域的發(fā)展起到積極促進(jìn)作用.經(jīng)過同行評(píng)審,本期共收錄6 篇論文.

      綜述性論文1 篇.趙川等人的論文《實(shí)用安全兩方計(jì)算及其在基因組序列比對(duì)中的應(yīng)用》,總結(jié)分析了安全兩方計(jì)算近年來(lái)在實(shí)用性方面的主要研究成果,并重點(diǎn)介紹了實(shí)用安全兩方計(jì)算在基因組序列比對(duì)中的研究進(jìn)展.作者從安全兩方計(jì)算的兩個(gè)主要構(gòu)造方法(同態(tài)加密和混亂電路)出發(fā),分別給出了較為清晰的發(fā)展脈絡(luò).此外,該文指出了現(xiàn)階段基于安全兩方計(jì)算的基因組序列比對(duì)研究中存在的幾點(diǎn)不足,并分析了未來(lái)可能的研究方向.

      特定安全多方計(jì)算協(xié)議論文3 篇.杜潤(rùn)萌等人的論文《矩陣與增廣矩陣秩相等問題的保密計(jì)算及應(yīng)用》,在半誠(chéng)實(shí)敵手模型下,設(shè)計(jì)了矩陣與增廣矩陣秩相等判定問題的安全多方計(jì)算協(xié)議,并將該協(xié)議用于解決保密判斷多項(xiàng)式整除、保密判定直線與直線的位置關(guān)系等問題.李占利等人的論文《云環(huán)境下多方保密計(jì)算最大值、最小值及其統(tǒng)計(jì)學(xué)應(yīng)用》首先使用0-1 編碼方法,使得保密數(shù)據(jù)隱藏于所編碼的0-1 數(shù)組中,然后利用云環(huán)境下多密鑰NTRU 全同態(tài)加密算法,在半誠(chéng)實(shí)敵手模型下,設(shè)計(jì)了在云計(jì)算環(huán)境下解決最大值、最小值計(jì)算的安全多方計(jì)算協(xié)議.葛雪等人的論文《直方圖與餅形圖的保密生成協(xié)議》,利用加同態(tài)加密算法,設(shè)計(jì)了數(shù)據(jù)求和的安全多方計(jì)算協(xié)議,并進(jìn)一步轉(zhuǎn)化為直方圖與餅形圖,該協(xié)議也是在半誠(chéng)實(shí)敵手模型下證明安全的.

      安全多方計(jì)算應(yīng)用協(xié)議2 篇.朱巖等人的論文《基于安全多方計(jì)算的區(qū)塊鏈智能合約執(zhí)行系統(tǒng)》,提出了基于安全多方計(jì)算的智能合約框架、面向線性秘密共享的公平安全多方計(jì)算算法設(shè)計(jì)、以及非阻塞信息傳遞接口等三方面技術(shù),保證了智能合約執(zhí)行中的輸入隱私性和計(jì)算正確性,從而增強(qiáng)了區(qū)塊鏈中智能合約執(zhí)行安全.王啟正等人的論文《一種處理隱私保護(hù)數(shù)據(jù)的神經(jīng)網(wǎng)絡(luò)》,利用基于同態(tài)加密的安全多方計(jì)算技術(shù),設(shè)計(jì)了神經(jīng)網(wǎng)絡(luò)計(jì)算外包協(xié)議,在保障數(shù)據(jù)隱私性的前提下保留了數(shù)據(jù)的可計(jì)算性.

      安全多方計(jì)算是密碼學(xué)的一個(gè)重要研究領(lǐng)域,它隨著公鑰密碼技術(shù)的出現(xiàn)而產(chǎn)生,經(jīng)過了長(zhǎng)時(shí)間的發(fā)展.近年來(lái),隨著安全多方計(jì)算協(xié)議本身效率的提升,以及各種分布式應(yīng)用場(chǎng)景對(duì)安全和隱私保護(hù)的迫切要求,安全多方計(jì)算協(xié)議的研究成為密碼學(xué)方向最有活力的研究領(lǐng)域之一.通過本期專欄,希望讀者能夠管中窺豹,見安全多方計(jì)算技術(shù)最新研究動(dòng)向之一斑.

      In the secure multi-party computation(SMPC),two or more participants who have private inputs,want to jointly calculate some functionalities,get their outputs,and achieve some secure properties such as correctness,privacy,fairness,and so on.In recent years,with the development of cloud computing,big data,artificial intelligence,block chains,and other technologies,the challenges of data security and privacy protection have become increasingly prominent.Secure multi-party computing has been highly expected,and is recognized as an important technique to solve such problems,which has attracted unprecedented attention.

      In order to promote the theoretical and applied research of SMPC in China,Journal of Cryptologic Research organized the special column on ”Secure Multi-party Computing Technology” by calling and inviting for papers widely,hoping to promote the development of this field.6 papers are selected into this special column after the peer review process.

      One review is included in this special column.“Advances in Practical Secure Two-party Computation and Its Application in Genomic Sequence Comparison”by Zhao Chuan et al.reviews the advances in practical secure two-party computation in recent years,and focuses on the major research results in the field of genomic sequence comparison based on secure two-party computation.The authors start with introducing two major construction techniques(i.e.,homomorphic encryption and garbled circuit),and give a clear development trend,respectively.In addition,the existing deficiencies in this research area and some possible research directions are pointed out.

      Three papers on specific secure multi-party computation protocol are included in this special column.The paper entitled“Privately Determining Equality of Ranks of Matrix and Its Augmented Ones and Applications”by Du Run-Meng et al.designs an SMPC protocol in semi-honest adversaries model to determine whether the rank of a matrix is equal to its augmented ones,and applies this protocol in privately determining the relationship between two lines,determining whether a polynomial divides another one.The paper entitled “Secure Multiparty Computation of the Maximum and the Minimum in Cloud Environment and Its Statistics Application”by Li Zhan-Li et al.adapts 0-1 encoding method to encode a private number into an array,and then using the multikey NTRU fully homomorphic encryption algorithm in cloud environment,designs the SMPC protocol in semi-honest adversaries model to compute the maximum and the minimum value.The paper entitled “Histogram and Pie Chart of Confidentiality Generation Agreement” by Ge Xue et al.uses homomorphic encryption algorithm to design an SMPC protocol to compute the summation,and further convert it to generate the histogram and pie chart.The protocol is also proved in semi-honest adversaries model.

      Two papers on secure multi-party computation application protocol are included in this special column.The paper entitled “Smart Contract Execution System over Blockchain Based on Secure Multi-party Computation”by Zhu Yan et al.proposes three technologies:a smart contract framework based on secure multi-party computation(SMPC),a fair SMPC algorithm built on linear secret sharing,and a non-blocking message passing interface,to ensure the privacy of inputs and the correctness of computing result during smart contract execution.Thus,the execution security of smart contract can be enhanced by the proposed technologies in the Blockchain.The paper entitled “Neural Network for Processing Privacy-protected Data” by Wang Qi-Zheng et al.uses the homomorphic encryption based SMPC to design a neural network computation outsourcing protocol.It keeps the computability of data under the premise of ensuring data privacy.

      SMPC is an important research field in cryptography.It has been developed for a long time with the emergence of public key cryptography.In recent years,with the improvement of the efficiency of secure multi-party computing protocols and the urgent requirement of security and privacy protection in various distributed application scenarios,the research of SMPC protocols has become one of the most liven research fields in cryptography.Through this special column,we hope that readers can get a glimpse of the research trends in SMPC technology.

      猜你喜歡
      同態(tài)計(jì)算技術(shù)保密
      《計(jì)算技術(shù)與自動(dòng)化》2022年總目次索引
      多措并舉筑牢安全保密防線
      《信息安全與通信保密》征稿函
      關(guān)于半模同態(tài)的分解*
      拉回和推出的若干注記
      基于云計(jì)算技術(shù)的FLAC3D軟件計(jì)算平臺(tái)的研發(fā)
      《物探化探計(jì)算技術(shù)》2016年1~6期總要目
      一種基于LWE的同態(tài)加密方案
      HES:一種更小公鑰的同態(tài)加密算法
      論中國(guó)共產(chǎn)黨的保密觀
      宁晋县| 嘉定区| 牟定县| 岑溪市| 什邡市| 友谊县| 梓潼县| 澄城县| 锦屏县| 巩义市| 苍溪县| 晋中市| 右玉县| 新竹市| 宁明县| 时尚| 长葛市| 东丽区| 陕西省| 新疆| 五台县| 随州市| 宁南县| 抚远县| 洛宁县| 康平县| 肇庆市| 印江| 高青县| 奎屯市| 左贡县| 班玛县| 大石桥市| 富川| 新竹县| 丰镇市| 汤原县| 永定县| 嘉鱼县| 山丹县| 左权县|