Font Size: a A A

Design And Implementation Of Two-Party Set-Intersection Private Computing Protocol

Posted on:2010-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ChenFull Text:PDF
GTID:2178360275958316Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The intersection operation between two data sets is one of computer algorithms used in actual applications and control programs.Most times,each party jointed the intersect operation only wishes could get a result of sharing data set,and on the another hand also wishes could reduce exposure of whole data set to the least.Therefore 2-party set-intersection private computing is very useful and necessary.Present,a few of private computing schemes were proposed by some researchers,but oversized complexity,low production,unweighable securirty level,narrow applicable scope and so on factors restrict their applications,and their implementations are very less.This paper presents the more practical theories of 2-party set-intersection private computation protocol which proposed recently,and designs and realizes this protocol according to this.In efficiency,used of index operation on the elliptic curve,which has an advance in computational complexity and is speeded in comparing to index computation on integer under the same level security requirements.In the security,this proposal used the flexible design, freely adjustable security parameters and key length.Not only can satisfy requirement on the limited computation ability devices,but also can be applied on high-level secure required industrial equipments.Furthermore,the security of this algorithm is proved in mathematics way,for this reason its safety rate can be weighed.According to previous proposed based-on Boyen-Waters anonymous IBE(Identity-Based Encryption) 2-party set-intersection private computing theory,this paper supplemented relative theory without mentioned in original paper about Zero Knowledge Proof and Commitment,and consisted them into a completed protocol with the ability of 2-party set-intersection private computing.In addition to the theory feasible implementation of protocol has been proposed.Finally,an automatic all around test plan made for the application implemented the protocol,and the test result reflected the efficiency of protocol in the actual working situation and the bottleneck of its performance.
Keywords/Search Tags:Multiparty Private Computing, Set-Intersection Private Computing, Elliptic Curve, IBE, Commitment, Zero-knowledge Proof
PDF Full Text Request
Related items