期刊文献+

面向应用的隐私集合求交技术综述

Survey on Private Set Intersection Technology for Application
下载PDF
导出
摘要 隐私集合求交技术(PSI,private set intersection)是一种重要的隐私保护计算协议,用于在不泄露集合数据的情况下,安全地计算两个或多个参与方之间的集合交集。随着互联网和大数据的快速发展,用户对数据隐私保护的关注度不断提高,对于PSI的研究不仅在理论上具有重要意义,而且在实际应用中也具备极高的价值。PSI技术发展迅速且种类复杂多样,了解基于不同密码原语构建的PSI协议及其适用场景以及根据需求选择适当的PSI方案具有重要的实际意义。旨在全面概述PSI及其变体的研究进展和应用领域,并对隐私集合求交技术在实际产品中的应用进行调研。还对现有的主要PSI开源库进行了测试,评估它们的性能和适用性。最后,讨论隐私集合求交技术领域存在的挑战以及未来的发展方向。通过对PSI的全面介绍和深入研究,可以更好地理解该技术的重要性和应用价值,为隐私保护提供更加有效的解决方案,并推动PSI技术在实际场景中的广泛应用和发展。 Private set intersection(PSI)is an important privacy-preserving computation protocol,which safely computes the intersection of two or multiple sets without leaking set data.With the rapid development of the Internet and big data,the attention of users to data privacy protection is increasing.Therefore,the research on PSI is not only of significance in theory,but also of very high value in practice.PSI technology is developing rapidly,and its type is complex and diverse.Based on different cryptographic primitives,it constructs PSI protocols and their applicable scenarios,it is of great practical importance to select appropriate PSI schemes according to specific requirements.This paper aims to provide a comprehensive overview in the research progress and application area of PSI and its variants.The application of PSI techniques is researched in practical products.Additionally,the performance and applicability of major open-source PSI libraries are tested and evaluated.Finally,the challenge and future development direction are discussed in the field of PSI technology.Through comprehensively introducing and deeply researching on PSI,the importance and application value of this technology can be better understood,which provides a more effective solution for privacy protection and promotes the widespread application and development of PSI technology in practical scenarios.
作者 李晴雯 关海梅 李晖 LI Qingwen;GUAN Haimei;LI Hui(School of Cyber Engineering,Xidian University,Xi an 710126,China)
出处 《网络空间安全科学学报》 2023年第3期68-85,共18页 Journal of Cybersecurity
基金 国家自然科学基金重点项目(61932015)。
关键词 安全多方计算 隐私集合求交 不经意传输 同态加密 混淆电路 secure multi-party computation private set intersection oblivious transfer homomorphic encryption garbled circuit
  • 相关文献

参考文献5

二级参考文献80

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 3V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 4E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 5C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 6J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 7J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 8D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 9R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.
  • 10M A Al-Kahtani,R Sandhu.A model for attribute-based userrole assignment[A].Proceedings of the 18th Annual Computer Security Applications Conference[C].Washington:IEEE Computer Society,2002.353-362.

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部