篇名 |
Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications
|
---|---|
並列篇名 | Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications |
作者 | Xin Liu、Yang Xu、Gang Xu、Xiu-Bo Chen、Yu-Ling Cheng |
英文摘要 | With the rapid development of the Internet and information technology, the problem of zero-trust networks has become increasingly prominent, and secure multi-party computation has become a research hotspot to solve the problem of zero-trust networks. The secure judgment of point and line relationship is an important research branch of secure computing set geometry. However, most of resent secure computing protocols of point and line relationship are designed in the semi-honest model and cannot resist malicious attacks. Therefore, this paper analyzes the possible malicious adversary behaviors and designs a secure protocol in the malicious model. In this paper, the Paillier cryptosystem, zero- knowledge proof, and cut-choose method are used to resist malicious behavior, and the real/ideal model paradigm method is used to prove the security of the protocol. Compared with the existing solutions, the malicious model protocol is still efficient and widely used in real applications.
|
起訖頁 | 1019-1027 |
關鍵詞 | Secure multi-party computation、Point and line relationship、Malicious model、Real/ideal model paradigm |
刊名 | 網際網路技術學刊 |
期數 | 202209 (23:5期) |
出版單位 | 台灣學術網路管理委員會 |
DOI |
|
QR Code | |
該期刊 上一篇
| A Social Network Analysis of COVID-19 Transmission Models in Taiwan: Two Epidemic Waves in 2020-2021 |
該期刊 下一篇
| Flow Entry Timeouts Optimization over Software Defined Networks Supporting Elephant Flow Classification |