期刊文献+

基于权值加密的隐私安全分布式约束满足问题求解 被引量:1

Solving secure distributed constraint satisfaction problems based on encrypted weighted-privacy
下载PDF
导出
摘要 隐私安全的分布式约束满足问题(distributed constraint satisfaction problem,DisCSP)求解算法可以很好地满足信息敏感的分布式组合求解问题的需要,为了获得更好的求解效率,提出了一种基于权值加密的隐私安全DisCSP的求解算法,对DisCSP问题中的约束基于不同的隐私权值进行加密求解;不需要增加额外的agent进行隐私约束的一致性检查,实现分布式的安全求解策略;对于可能出现的推理信息,用随机选择策略来避免信息泄漏.试验表明,该算法可以减少信息的传递量和计算的复杂性,因而具有更好的求解效率. Algorithms for solving secure distributed constraint satisfaction problems can meet the requirements of information security of distributed combination problems. To improve the solving efficiency, an algorithm for solving secure DisCSP based on encrypted weighted-privacy was presented. The search procedure for solution was encrypted based on weight of different constraints; to realize a real distributed secure DisCSP protocol, additional agents were not introduced to check the consistency of private constraints. Finally, random selection strategy was used to prevent reasoning information leakage. Experimental results show that the algorithm obtains better solving efficiency through reducing the amount of information communicated and the complexity of computation.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2007年第7期785-790,共6页 JUSTC
基金 国家自然科学基金(60573077) 新世纪优秀人才支持计划(NCET-05-0549)资助
关键词 分布式约束满足 隐私安全 加密 异步回退 distributed constraint satisfaction private/secure encrypt asynchronously backtrack
  • 相关文献

参考文献12

  • 1Faltings B,Yokoo M.Introduction:Special issue on distributed constraint satisfaction[J].Artificial Intelligence,2005,161(1-2):1-5.
  • 2Silaghi M C.Solving a distributed csp with cryptographic multi-party computations,without revealing constraints and without involving trusted servers[C]//Proc.Workshop on DCR-03 IJCAI,Acapulco,Mexico,2003.
  • 3Silaghi M.C,Mitra D.Distributed constraint satisfaction and optimization with privacy enforcement[C]//Zhong N Proc of ICIAT.Los Alamitos:IEEE Press,2004:531-535.
  • 4Silaghi M C.Meeting scheduling system guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any DisCSP)[C]//Zhong N Proc of ICWI.Los Alamitos:IEEE Press,2004:711-715.
  • 5Silaghi M C.Hiding absence of solution for a distributed constraint satisfaction problem[C]//Russell I Proc of the 18th International FLAIRS Conference.Florida USA:AAAI Press,2005:854-855.
  • 6Goldreich O,Micali S,Wigderson A.How to play any mental game or a completeness theorem for protocols with honest majority[C]//Proc of the 19th Annual ACM STOC.New York:ACM Press,1987:218-229.
  • 7Chaum D,Cr'epeau C,Damgrd I.Multiparty unconditionally secure protocols (extended abstract)[C]// Proc of the 20th Annual ACM STOC.New York:ACM Press,1988:11-19.
  • 8Ben-Or M,Goldwasser S,Wigderson A.Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract)[C]// Proc of the 20th Annual ACM STOC.New York:ACM Press,1988:1-10.
  • 9Yokoo M,Suzuki K,Hirayama K.Secure distributed constraint satisfaction:reaching agreement without revealing private information[J].Artificial Intelligence,2005,161(1-2):229-245.
  • 10Kobbi Nissim and Roie Zivan.Secure DisCSP Protocols-From Centralized Towards Distributed Solutions[C]//Proc Workshop on DCR-05 IJCAI,Edinburgh,2005.

二级参考文献4

共引文献18

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部