期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
可复用Garbling的注解
1
作者 胡予濮 董思越 +1 位作者 王保仓 刘君 《密码学报》 CSCD 2023年第5期936-943,共8页
Garbling是一个有着多重应用的密码原语,主要适用于权力受限的场景,比如安全多方计算(MPC)、属性加密(ABE)、函数加密(FE)、不可区分混淆(IO)等等.2013年以前的garbling方案都是一次性garbling,GKP+13和Agr17提出了可复用garbling.我们... Garbling是一个有着多重应用的密码原语,主要适用于权力受限的场景,比如安全多方计算(MPC)、属性加密(ABE)、函数加密(FE)、不可区分混淆(IO)等等.2013年以前的garbling方案都是一次性garbling,GKP+13和Agr17提出了可复用garbling.我们曾经指出,可复用garbling并没有获得新的应用场景,它仍然是一个一次性garbling.本文继续讨论可复用garbling的可用性和效率.本文指出以下两点:(1)即使可复用garbling被当作一次性garbling使用,也常常是不可用的,它只能用于两个基本场景中的基本场景二,不能用于基本场景一.比如,它不能用于安全多方计算(MPC).(2)即使可复用garbling被当作一次性garbling用于基本场景二,没有证据表明它比原来的一次性garbling效率更高. 展开更多
关键词 garbling 函数加密(FE) 全同态加密(FHE) 属性加密(ABE)
下载PDF
Efficient secure and verifiable KNN set similarity search over outsourced clouds
2
作者 Xufeng Jiang Lu Li 《High-Confidence Computing》 2023年第1期38-46,共9页
KNN set similarity search is a foundational operation in various realistic applications in cloud computing.However,for security consideration,sensitive data will always be encrypted before uploading to the cloud serve... KNN set similarity search is a foundational operation in various realistic applications in cloud computing.However,for security consideration,sensitive data will always be encrypted before uploading to the cloud servers,which makes the search processing a challenging task.In this paper,we focus on the problem of KNN set similarity search over the encrypted datasets.We use Yao’s garbled circuits and secret sharing as underlying tools.To achieve better querying efficiency,we construct a secure R-Tree index structure based on a novel secure grouping protocol,which enables grouping appropriate private values in an oblivious way.Along with several elaborately designed secure arithmetic subroutines,we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds.Theoretically,we analyze the complexity of our schemes in detail,and prove the security in the presence of semi-honest adversaries.Finally,we evaluate the performance and feasibility of our proposed methods by extensive experiments. 展开更多
关键词 Privacy preservation KNN set similarity search Yao’s garbled circuits Cloud computing
下载PDF
Income smoothing and the cost of debt 被引量:5
3
作者 Si Li Nivine Richie 《China Journal of Accounting Research》 2016年第3期175-190,共16页
The literature on income smoothing focuses on the effect of earnings smoothing on the equity market.This paper investigates the effect of income smoothing on the debt market.Using the Tucker–Zarowin(TZ) statistic of ... The literature on income smoothing focuses on the effect of earnings smoothing on the equity market.This paper investigates the effect of income smoothing on the debt market.Using the Tucker–Zarowin(TZ) statistic of income smoothing,we find that firms with higher income smoothing rankings exhibit lower cost of debt,suggesting that the information signaling effect of income smoothing dominates the garbling effect.We also find that the effect of earnings smoothing on debt cost reduction is stronger in firms with more opaque information and greater distress risk. 展开更多
关键词 INCOME SMOOTHING EARNINGS SMOOTHING Cost of DEBT CREDIT SPREADS CREDIT ratings garbling
原文传递
Concretely ecient secure multi-party computation protocols:survey and mor 被引量:1
4
作者 Dengguo Feng Kang Yang 《Security and Safety》 2022年第1期47-89,共43页
Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purel... Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purely theoretical study to an object of practical interest,with a growing interest in practical applications such as privacy-preserving machine learning(PPML).In this paper,we comprehensively survey existing work on concretely ecient MPC protocols with both semi-honest and malicious security,in both dishonest-majority and honest-majority settings.We focus on considering the notion of security with abort,meaning that corrupted parties could prevent honest parties from receiving output after they receive output.We present high-level ideas of the basic and key approaches for designing di erent styles of MPC protocols and the crucial building blocks of MPC.For MPC applications,we compare the known PPML protocols built on MPC,and describe the eciency of private inference and training for the state-of-the-art PPML protocols.Further-more,we summarize several challenges and open problems to break though the eciency of MPC protocols as well as some interesting future work that is worth being addressed.This survey aims to provide the recent development and key approaches of MPC to researchers,who are interested in knowing,improving,and applying concretely ecient MPC protocols. 展开更多
关键词 Secure multi-party computation Privacy-preserving machine learning Secret sharings Garbled circuits Oblivious transfer and its arithmetic generalization
原文传递
t-Private and t-Secure Auctions
5
作者 Markus Hinkelmann Andreas Jakoby Peer Stechert 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期694-710,共17页
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically se... In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties 展开更多
关键词 multi-party private and secure computation garbled circuits private auctions
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部