|
计算机科学 2011
Secure Computation Protocol for Private Matching and Inclusion Relation against Outsourced Database System
|
Abstract:
The secure computation protocol based on distributed environment, namely Protocol 1, was proposed for privale matching against outsourced database system. The data owner adopted Mignotte's secret sharing scheme to outsource a dataset_ The user interacted with some third-party service provider to determine if some elements of the user's dataset belonged to the data owner's dataset by means of additive homomorphic encryption and secret reconstruction to construct discriminant and with the value of discriminant being zero or not, and ultimately realized private matching. In addition, the other protocol was also proposed to determine whether the user' s dataset was included in the owner' s dataset, namely protocol 2. In the semihonest model, the security of the two protocols was proved by simulator.