Computer Science ›› 2011, Vol. 38 ›› Issue (3): 120-122.
Previous Articles Next Articles
JIANG Ya-jun,YANG Bo,ZHANG Ming-wu,CHEN Xu-ri
Online:
Published:
Abstract: The secure computation protocol based on distributed environment, namely Protocol 1, was proposed for privale matching against outsourced database system. The data owner adopted Mignotte's secret sharing scheme to outsource a dataset_ The user interacted with some third-party service provider to determine if some elements of the user's dataset belonged to the data owner's dataset by means of additive homomorphic encryption and secret reconstruction to construct discriminant and with the value of discriminant being zero or not, and ultimately realized private matching. In addition, the other protocol was also proposed to determine whether the user' s dataset was included in the owner' s dataset, namely protocol 2. In the semihonest model, the security of the two protocols was proved by simulator.
Key words: Outsourced databases,Secret sharing,Private matching,Simulator
JIANG Ya-jun,YANG Bo,ZHANG Ming-wu,CHEN Xu-ri. Secure Computation Protocol for Private Matching and Inclusion Relation against Outsourced Database System[J].Computer Science, 2011, 38(3): 120-122.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I3/120
Cited