Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 380-387.doi: 10.11896/jsjkx.200400091
• Information Security • Previous Articles Next Articles
LI Yan-bin1, LIU Yu2, LI Mu-zhou3, WU Ren-tao1, WANG Peng-da1
CLC Number:
[1] YAO A.Protocols for Secure Computations (Extended Abstract)[C]//IEEE Annual Symposium on Foundations of Computer Science(FOCS).1982:160-164. [2] LIPMAA H,ASOKAN N,NIEMI V.Secure Vickrey Auctions without Threshold Trust[C]//Financial Cryptography.2002:87-101. [3] PARKES D,RABIN M,SHIEBER S,et al.Practical Secrecy-Preserving,Verifiably Correct and Trustworthy Auctions[J].Electronic Commerce Research and Applications,2006,7(3):70-81. [4] RABIN M,MANSOUR Y,MUTHUKRISHNAN S,et al.Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions[C]// International Colloquium on Automata,Languages,and Programming (ICALP).2012:738-749. [5] KUSTERS R,TRUDERUNG T,VOGT A.A Game-based Definition of Coercion Resistance and its Applications[J].Journal of Computer Security,2012,20(6):709-764. [6] ZHONG H,HUANG L,LUO Y.A Multi-Candidate Electronic Voting Scheme Based on Secure Sum Protocol[J].Journal of Computer Research and Development,2006,43(8):1405-1410. [7] LUO Y,XU Z,HUANG L.Secure Multi-party Statistical Analysis Problems and Their Applications[J].Computer Engineering and Application.2005,24:145-147. [8] LIU J,JUUTI M,LU Y,et al.Oblivious Neural Network Predictions via MiniONN Transformations[C]//ACM Conference on Computer and Communications Security.2017:619-631. [9] YAGA D,MELL P,ROBY N,et al.Blockchain TechnologyOverview:NIST Interagency/Internal Report (NISTIR)-8202[R].2018. [10] WANG T,MA W,LUO W.Information Sharingand SecureMulti-party Computing Model Based on Blockchain[J].ComputerScience,2019,46(9):162-168. [11] KOSBA A,MILLER A,SHI E,et al.Hawk:The BlockchainModel of Cryptography and Privacy-Preserving Smart Contracts[C]//IEEE Symposium on Security and Privacy.2016:839-858. [12] ZYSKIND G,NATHAN O,PENTLAND A.Decentralizing Privacy:Using Blockchain to Protect Personal Data[C]//IEEE Symposium on Security and Privacy Workshops.2015:180-184. [13] YAO A.Howto Generate and Exchange Secrets (Extended Abstract)[C]//IEEE Annual Symposium on Foundations of Computer Science (FOCS).1986:162-167. [14] GOLDREICH O.The Foundations of Cryptography-Volume 2:Basic Applications[M].Cambridge University Press,2004. [15] GOLDREICH O,MICALI S,WIGDERSON A.How to Play any Mental Game or A Completeness Theorem for Protocols withHonest Majority[C]//ACM Symposium on Theory of Computing (STOC).1987:218-229. [16] BEN-OR M,GOLDWASSER S,WIGDERSON A.Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)[C]//ACM Symposium on Theory of Computing(STOC).1988:1-10. [17] BEAVER D,MICALI S,ROGAWAY P.The Round Complexity of Secure Protocols (Extended Abstract)[C]//ACM Symposium on Theory of Computing(STOC).1990:503-513. [18] KOLESNIKOV V.GateEvaluationSecret SharingandSecureOne-RoundTwo-PartyComputation[C]//The 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT).2005:136-155. [19] KOLESNIKOV V.Secure Two-party Computation and Communication [D].Canada:University of Toronto,2006. [20] BENDLIN R,DAMGARD I,ORLANDI C,et al.Semi-homo-morphic Encryption and MultipartyComputation[C]//The 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).2011:169-188. [21] DAMGARD I,PASTRO V,SMART N,et al.Multiparty Computation from Somewhat Homomorphic Encryption[C]//The 32nd Annual Cryptology Conference (CRYPTO).2012:643-662. [22] CRAMER R,DAMGARD I.On the Amortized Complexity ofZero-Knowledge Protocols[C]//The 29th Annual Cryptology Conference (CRYPTO).2009:177-191. [23] DAMGARD I,KELLER M,LARRAIA E,et al.Practical Covertly Secure MPC for Dishonest Majority-Or:Breaking the SPDZ Limits[C]//European Symposium on Research in Computer Security(ESORICS).2013:1-18. [24] KELLER M,ORSINI E,SCHOLL P.MASCOT:Faster Malicious Arithmetic Secure Computation with Oblivious Transfer[C]//ACM Conference on Computer and Communications Security.2016:830-842. [25] KELLER M,PASTRO V,ROTARU D.Overdrive:Making SPDZ Great Again[C]//The 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).2018:158-189. [26] MOHASSELP,RINDAL P.ABY 3:A Mixed Protocol Framework for Machine Learning[C]//ACM Conference on Computer and Communications Security.2018:35-52. [27] BUSCHER N,HOLZER A,WEBER A,et al.Compiling LowDepth Circuits for Practical Secure Computation[C]//European Symposium on Research in Computer Security (ESORICS).2016:80-98. [28] WANG X,MALOZEMOFF A J,KATZ J.EMP-toolkit:Effi-cient Multi-Party computation toolkit[EB/OL].(2016-11-03) [2016-11-03].https://github.com/emp-toolkit. [29] Alexandra Institute.FRESCO-A Framework for Efficient Secure Computation[EB/OL].(2020-01-07) [2020-01-07].https://github.com/aicis/fresco. [30] MOODB,GUPTA D,CARTER H,et al.Frigate:A Validated,Extensible,and Efficient Compiler and Interpreter for Secure Computation[C]//IEEE European Symposium on Security and Privacy (EuroS&P).2016:112-127. [31] Multiparty.org Development Team.JavaScript implementation of federated functionalities[EB/OL].(2020-04-07) [2020-04-07].https://github.com/multiparty/jiff. [32] SCHOENMAKERS B.MPyC:Secure Multiparty Computationin Python[EB/OL].(2020-06-06) [2020-06-06].https://github.com/lschoe/mpyc. [33] ZAHUR S,EVANS D.Obliv-C:A Language for Extensible Data Oblivious Computation[R].Cryptology ePrint Archive,Report 2015:1153. [34] LIU C,WANG X S,NAYAK K,et al.ObliVM:A Programming Framework for Secure Computation[C]//IEEE Symposium on Security and Privacy.2015:359-376. [35] ZHANG Y,STEELE A,BLANTON M.PICCO:a General-purpose Compiler for Private Distributed Computation[C]//ACM Conference on Computer and Communications Security.2013:813-826. [36] KU Leuven COSIC.SCALE-MAMBA[EB/PL].(2020-05-06)[2020-05-06].https://github.com/KULeuven-COSIC/SCALE-MAMBA. [37] KELLER M.MP-SPDZ:A Versatile Framework for Multi-Party Computation[J].Cryptology ePrint Archive,Report 2020:521. [38] BEAVER D.Efficient Multiparty Protocols Using Circuit Randomization[C]//The 11th Annual International Cryptology Conference (CRYPTO).1991:420-432. [39] LARRAIA E.Extending Oblivious Transfer Efficiently-or-How to Get Active Security with ConstantCryptographic Overhead[C]//The 3rdInternational Conference on Cryptology and Information Security in Latin America (LATINCRYPT).2014:368-386. |
[1] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[2] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[3] | LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310. |
[4] | JI Yan, DAI Hua, JIANG Ying-ying, YANG Geng, Yi Xun. Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds [J]. Computer Science, 2021, 48(5): 320-327. |
[5] | LIU Feng, WANG Yi-fan, YANG Jie, ZHOU Ai-min, QI Jia-yin. Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS [J]. Computer Science, 2021, 48(11): 46-53. |
[6] | WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307. |
[7] | CAI Wei, BAI Guang-wei, SHEN Hang, CHENG Zhao-wei, ZHANG Hui-li. Reinforcement Learning Based Win-Win Game for Mobile Crowdsensing [J]. Computer Science, 2020, 47(10): 41-47. |
[8] | WANG Tong, MA Wen-ping, LUO Wei. Information Sharing and Secure Multi-party Computing Model Based on Blockchain [J]. Computer Science, 2019, 46(9): 162-168. |
[9] | LIU Meng-jun, LIU Shu-bo and DING Yong-gang. 0-1 Code Based Privacy-preserving Data Value Matching in Participatory Sensing [J]. Computer Science, 2018, 45(3): 131-137. |
[10] | ZHANG Yan-ping and LING Jie. Improved Algorithm for Privacy-preserving Association Rules Mining on Horizontally Distributed Databases [J]. Computer Science, 2017, 44(8): 157-161. |
[11] | ZHANG Xiao-lin, ZHANG Chen, ZHANG Wen-chao, ZHANG Huan-xiang and YU Fang-ming. D-VSSP:Distributed Social Network Privacy Preserving Algorithm [J]. Computer Science, 2017, 44(2): 93-97. |
[12] | CHEN Chao-qun and LI Zhi-hua. Privacy-preserving Oriented Ciphertext Retrieval Algorithm [J]. Computer Science, 2016, 43(Z11): 346-351. |
[13] | XU Zhou-bo, YU Qiang-sheng, GU Tian-long and NING Li-hua. Secure Multi-party Computation Based on Symbolic Edge-valued Binary Decision Diagram [J]. Computer Science, 2016, 43(4): 127-133. |
[14] | TANG Xuan, ZHONG Hong, SHI Run-hua and CUI Jie. Efficient Solution to SMP Based on Coding and Homomorphic Encryption [J]. Computer Science, 2016, 43(1): 181-185. |
[15] | YANG Zhao-huan, LIU Shu-bo, LI Yong-kai and CAI Chao-hui. Symptoms Privacy-preserving Matching Protocol for m-Healthcare Social Network [J]. Computer Science, 2015, 42(4): 119-122. |
|