• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Ke and Dai Yiqi. Secure Multiparty Computation of Statistical Distribution[J]. Journal of Computer Research and Development, 2010, 47(2): 201-206.
Citation: Wang Ke and Dai Yiqi. Secure Multiparty Computation of Statistical Distribution[J]. Journal of Computer Research and Development, 2010, 47(2): 201-206.

Secure Multiparty Computation of Statistical Distribution

More Information
  • Published Date: February 14, 2010
  • Secure multi-party computation is now a crucial privacy preserving technology in network computing environment, and it plays an important role in cryptography. It is a basic block to construct other cryptographic protocol, and is recently a research focus in international cryptographic community. The researchers from home and abroad have made extensive researches on secure multi-party computations, and a lot of theoretical and practical achievements have been obtained, and yet a lot of practical problems need to be further studied. The authors first briefly introduce the state of the art in the study of secure multi-party computation, and some problems need to be further studied. Secondly, they study the secure problems that are encountered in statistics. Aiming at privacy preserving computing of statistical distribution, which is frequently encountered in statistics, and based on the intractability of computing discrete logarithm and using rigorous logic, three solutions are proposed to this problem. The privacy preserving property of these solutions are proved by simulation paradigm. The study of this problem has not been read in the literature. These solutions are of great importance in practical privacy preserving statistical computation. They can be used to protect the privacy of the informant, so that the informant need not worry about the leakage of their privacy. This makes the statistical results be more reliable and have more reference value.
  • Related Articles

    [1]Wang Jieting, Qian Yuhua, Li Feijiang, Liu Guoqing. Support Vector Machine with Eliminating the Random Consistency[J]. Journal of Computer Research and Development, 2020, 57(8): 1581-1593. DOI: 10.7544/issn1000-1239.2020.20200127
    [2]Feng Chang, Liao Shizhong. Model Selection for Gaussian Kernel Support Vector Machines in Random Fourier Feature Space[J]. Journal of Computer Research and Development, 2016, 53(9): 1971-1978. DOI: 10.7544/issn1000-1239.2016.20150489
    [3]Hua Xiaopeng, Ding Shifei. Locality Preserving Twin Support Vector Machines[J]. Journal of Computer Research and Development, 2014, 51(3): 590-597.
    [4]Guo Husheng, Wang Wenjian. A Support Vector Machine Learning Method Based on Granule Shift Parameter[J]. Journal of Computer Research and Development, 2013, 50(11): 2315-2324.
    [5]Ding Lizhong and Liao Shizhong. Approximate Model Selection on Regularization Path for Support Vector Machines[J]. Journal of Computer Research and Development, 2012, 49(6): 1248-1255.
    [6]Xu Peng, Liu Qiong, and Lin Sen. Internet Traffic Classification Using Support Vector Machine[J]. Journal of Computer Research and Development, 2009, 46(3): 407-414.
    [7]Xiong Jinzhi, Yuan Huaqiang, Peng Hong. A General Formulation of Polynomial Smooth Support Vector Machines[J]. Journal of Computer Research and Development, 2008, 45(8): 1346-1353.
    [8]Li Yingxin and Ruan Xiaogang. Feature Selection for Cancer Classification Based on Support Vector Machine[J]. Journal of Computer Research and Development, 2005, 42(10): 1796-1801.
    [9]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.
    [10]Wu Gaowei, Tao Qing, Wang Jue. Support Vector Machines Based on Posteriori Probability[J]. Journal of Computer Research and Development, 2005, 42(2): 196-202.

Catalog

    Article views (838) PDF downloads (490) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return