• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong. Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method[J]. Journal of Computer Research and Development, 2017, 54(7): 1549-1556. DOI: 10.7544/issn1000-1239.2017.20160034
Citation: Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong. Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method[J]. Journal of Computer Research and Development, 2017, 54(7): 1549-1556. DOI: 10.7544/issn1000-1239.2017.20160034

Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method

More Information
  • Published Date: June 30, 2017
  • The most existing protocols for secure computation of set-inclusion are based on multiple public-key encryption algorithms and cannot either be computed publicly, which makes the computation complexity high and the application range limited as well. To cope with these problems, we design two protocols for secure computation of set-inclusion with the unencrypted method. Protocol 1 first transforms the original problem into the scalar-product problem, and then solves it with the hard problem in cryptography. Next, we present the practical protocol 2 under a certain scenario with a third untrusted party, in which we solve the set-inclusion problem combing the bilinear pairing with the hard problem in cryptography. Lastly, we give the security proof of two protocols, the performance analysis and comparison with others. Both of our protocols employ neither any public-key encryption algorithm nor multiple matching searches so as to avoid the intricate procedures of key-generation, encryption and decryption. This makes our protocols more efficient and concise than the previously known. In addition, we extend the secure computation of set-inclusion to a new application scenario, in which we can determine the set-inclusion relation publicly without revealing the privacy of both sets even if the untrusted third party exists.
  • Related Articles

    [1]Li Xi, Hu Zhigang, Hu Zhoujun, Yan Chaokun. Grid Workflow Scheduling Algorithm Based on Deadline Satisfaction[J]. Journal of Computer Research and Development, 2011, 48(5): 877-884.
    [2]Han Rui, Liu Yingbo, Wen Lijie, and Wang Jianmin. A Probabilistic Approach to Analyze and Adjust Time Constraints in Workflow Management System[J]. Journal of Computer Research and Development, 2010, 47(1): 157-163.
    [3]Yuan Yingchun, Li Xiaoping, Wang Qian, Wang Kejian. Time Optimization Heuristics for Scheduling Budget-Constrained Grid Workflows[J]. Journal of Computer Research and Development, 2009, 46(2): 194-201.
    [4]Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    [5]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.
    [6]Xiao Zhengjin, He Qinming, and Chen Qi. A Multilevel Model of Task Assignment in Fuzzy Situations of Workflow[J]. Journal of Computer Research and Development, 2007, 44(2): 302-309.
    [7]Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953.
    [8]Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.
    [9]Jiang Hao and Dong Yisheng. A Time Performance Evaluation Method for Workflow Based on Extended Timed Petri Net[J]. Journal of Computer Research and Development, 2005, 42(5): 849-855.
    [10]Zhao Zhikun, Sheng Qiujian, Shi Zhongzhi. An Execution Semantics of UML Activity View for Workflow Modeling[J]. Journal of Computer Research and Development, 2005, 42(2): 300-307.

Catalog

    Article views (1127) PDF downloads (314) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return