• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion[J]. Journal of Computer Research and Development, 2005, 42(10): 1647-1653.
Citation: Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion[J]. Journal of Computer Research and Development, 2005, 42(10): 1647-1653.

Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion

More Information
  • Published Date: October 14, 2005
  • Secure multi-party computation is a research focus in international cryptographic community. This paper focuses on the secure multi-party computation of set-inclusion and graph-inclusion problems and a secure multi-party computation solution to set-inclusion problem is proposed. Based on this solution and combined with Monte Carlo approach and Cantor encoding, an approximate secure multi-party computation solution to graph-inclusion problem is further proposed. It is proved by simulation paradigm that these solutions are secure. Comparing with known solutions, these solutions can solve more complicated problems and have, with lower communication complexity, more applicability. For some problems that can be solved with known solutions, the new solutions have less computational complexity.
  • Related Articles

    [1]Wang Guohua, David Hung-Chang Du, Wu Fenggang, Liu Shiyong. Survey on High Density Magnetic Recording Technology[J]. Journal of Computer Research and Development, 2018, 55(9): 2016-2028. DOI: 10.7544/issn1000-1239.2018.20180264
    [2]He Wenbin, Liu Qunfeng, Xiong Jinzhi. The Error Theory of Polynomial Smoothing Functions for Support Vector Machines[J]. Journal of Computer Research and Development, 2016, 53(7): 1576-1585. DOI: 10.7544/issn1000-1239.2016.20148462
    [3]Bi Anqi, Dong Aimei, Wang Shitong. A Dynamic Data Stream Clustering Algorithm Based on Probability and Exemplar[J]. Journal of Computer Research and Development, 2016, 53(5): 1029-1042. DOI: 10.7544/issn1000-1239.2016.20148428
    [4]Wang Lijin, Zhong Yiwen, Yin Yilong. Orthogonal Crossover Cuckoo Search Algorithm with External Archive[J]. Journal of Computer Research and Development, 2015, 52(11): 2496-2507. DOI: 10.7544/issn1000-1239.2015.20148042
    [5]Xu Min, Deng Zhaohong, Wang Shitong, Shi Yingzhong. MMCKDE: m-Mixed Clustering Kernel Density Estimation over Data Streams[J]. Journal of Computer Research and Development, 2014, 51(10): 2277-2294. DOI: 10.7544/issn1000-1239.2014.20130718
    [6]Shen Yue, Guo Longjiang, Li Jinbao. Density and Distance Based Probabilistic Broadcasting Algorithm in Mobile Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(1): 151-160.
    [7]Zong Dan, Li Chunpeng, Xia Shihong, Wang Zhaoqi. Key-Postures Based Automated Construction of Motion Graph[J]. Journal of Computer Research and Development, 2010, 47(8): 1321-1328.
    [8]Xiong Jinzhi, Yuan Huaqiang, Peng Hong. A General Formulation of Polynomial Smooth Support Vector Machines[J]. Journal of Computer Research and Development, 2008, 45(8): 1346-1353.
    [9]Song Yuqing, Xie Conghua, Zhu Yuquan, Li Cunhua, Chen Jianmei, Wang Lijun. Research on Medical Image Clustering Based on Approximate Density Function[J]. Journal of Computer Research and Development, 2006, 43(11): 1947-1952.
    [10]Chen Jun and Wang Guojin. Constructing Convexity-Preserving Interpolation Curves of Hyperbolic Polynomial B-Splines Using a Shape Parameter[J]. Journal of Computer Research and Development, 2006, 43(7): 1216-1224.

Catalog

    Article views (783) PDF downloads (949) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return