dc.contributor.advisor | 陳恭 | zh_TW |
dc.contributor.advisor | Cheng, Kung | en_US |
dc.contributor.author (Authors) | 蕭名宏 | zh_TW |
dc.contributor.author (Authors) | Hsiao, Ming Hung | en_US |
dc.creator (作者) | 蕭名宏 | zh_TW |
dc.creator (作者) | Hsiao, Ming Hung | en_US |
dc.date (日期) | 2009 | en_US |
dc.date.accessioned | 8-Dec-2010 12:08:32 (UTC+8) | - |
dc.date.available | 8-Dec-2010 12:08:32 (UTC+8) | - |
dc.date.issued (上傳時間) | 8-Dec-2010 12:08:32 (UTC+8) | - |
dc.identifier (Other Identifiers) | G0097753002 | en_US |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/49472 | - |
dc.description (描述) | 碩士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊科學學系 | zh_TW |
dc.description (描述) | 97753002 | zh_TW |
dc.description (描述) | 98 | zh_TW |
dc.description.abstract (摘要) | 資訊安全的研究裡,運用安全多方計算的方法,可使得多方在不洩漏各自私有資訊的條件下完成某種函式的計算。其中一種做法是利用scalar product來當作計算的基礎演算邏輯單元,並進而建構其他更複雜的安全多方計算。根據目前現有的安全多方運算協定,可再加以定義出一些基本的運算規則,像是一般的程式語言中常用到的變數型態,如整數、浮點數、布林值,我們可定義出安全的秘密資料形態來,並且要能達到算數計算就必須擁有數值處理的能力,如基本的四則運算等,所以提供了相關聯的安全計算協定。根據安全多方計算的運算平台,可具有處理算術計算的能力,使得可處理一般安全計算的問題。我們並提供一個script轉譯工具,使得使用者可自行撰寫自己的安全多方計算程式,並可利用此工具來自動將使用者寫的程式碼轉成安全多方運算平台可接受的程式碼,如此一來,解決安全多方計算的問題將會變得更為容易。 | zh_TW |
dc.description.abstract (摘要) | Protocols for secure multi-party computation (SMC) allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. This thesis concerns the implementation SMC using of a set of information theoretically secure protocols based on scalar product protocol. This main characteristic of this approach is taking the scalar product computation as the basic building, and then use it to construct more complex computation protocols. We developed an SMC implementation framework for both integers and floating numbers which comprises a set of arithmetic operations that manipulate secret values among involved parties using the scalar product protocol as the basis. Such a library of arithmetic operations is call building blocks. Besides, to ease the writing of more complex user-defined protocols, we developed a simple scripting language and a translation tool that converts user script code to SMC code, which is code composed of the building blocks we developed. | en_US |
dc.description.tableofcontents | 一、介紹 11.1 背景1.2 目標二、文獻回顧 52.1 SECRET SHARING2.2 SCALAR PRODUCT PROTOCOL2.3 A COMMODITY-BASED APPROACH TO SCALAR PRODUCT PROTOCOL2.4 INFORMATION-THEORY BASED SECURITY DEFINITION2.5 THE COMPOSITIONAL THEOREM2.6 BUILDING BLOCKS三、研究方法與系統架構 113.1 SECURE DATA TYPE3.2 SECURE SCALAR PRODUCT MODULE3.3 BUILDING BLOCK PROTOCOLS3.4 SYSTEM ARCHITECTURE四、演算法設計 204.1 PRELIMINARY4.2 PRIMITIVE AND USEFUL BUILDING BLOCKS4.2.1 zn_to_z2 Protocol4.2.2 z2_to_zn Protocol4.2.3 negative? , less_than, great_than Protocol4.2.4 if_then_else Protocol4.3 PROTOCOL FOR INTEGER CLASS4.3.1 Plus4.3.2 Minus4.3.3 Product4.3.4 Division4.4 PROTOCOL FOR FLOAT (DOUBLE) CLASS4.4.1 Float Plus & Float Minus4.4.2 Float Product4.4.3 Float Division4.5 A TRANSLATOR BASED PROTOCOL DEVELOPMENT TOOL4.5.1 Translation Tool4.5.2 Operation Statement Translation4.5.3 Constant Number Translation4.5.4 If Statement Translation五、實驗與評估 415.1 實驗設計5.2 實驗數據5.3 實驗討論六、結論 546.1 貢獻6.2 未來研究七、參考文獻 56 | zh_TW |
dc.format.extent | 1708976 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0097753002 | en_US |
dc.subject (關鍵詞) | 安全多方計算 | zh_TW |
dc.subject (關鍵詞) | 浮點數 | zh_TW |
dc.subject (關鍵詞) | 轉譯器 | zh_TW |
dc.subject (關鍵詞) | Secure Multi-party Computation | en_US |
dc.subject (關鍵詞) | floating number | en_US |
dc.subject (關鍵詞) | translator | en_US |
dc.title (題名) | 基於多方安全計算之算術運算 | zh_TW |
dc.title (題名) | Arithmetic operations for secure multi-party computation | en_US |
dc.type (資料類型) | thesis | en |
dc.relation.reference (參考文獻) | [1] C. Yao,“Protocols for secure computation,” in Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, November 1982, pp. 160–164. | zh_TW |
dc.relation.reference (參考文獻) | [2] Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” in STOC ’87: Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1987, pp. 218–229. | zh_TW |
dc.relation.reference (參考文獻) | [3] P. Bogetoft, D.L. Christensen, I. Dåmgard, M. Geisler, T. Jakobsen, M. Krøigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach and T. Toft. Multi-Party Computation Goes Live Cryptology ePrint Archive, Report 2008/068, 2008. | zh_TW |
dc.relation.reference (參考文獻) | [4] W. Du and Z. Zhan, “A practical approach to solve secure multi-party computation problems,” in NSPW ‘02: Proceedings of the 2002 Workshop on New Security Paradigms. New York, NY, USA: ACM Press, 2002, pp. 127–135. | zh_TW |
dc.relation.reference (參考文獻) | [5] D. Beaver, “Commodity-based cryptography (extended abstract),” in STOC ’97: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1997, pp. 446–455. | zh_TW |
dc.relation.reference (參考文獻) | [6] I.-C. Wang, C.-H. Shen, T.-S. Hsu, C.-C. Liau, D.-W. Wang, and J. Zhan, “Towards empirical aspects of secure scalar product,” in ISA ’08: IEEE International Conference on Information Security and Assurance, April 2008, pp. 573–578. | zh_TW |
dc.relation.reference (參考文獻) | [7] J. Algesheimer, J. Camenisch, and V. Shoup, “Efficient computation modulo a shared secret with application to the generation of shared safe-prime products,” Advances in Cryptology X CRYPTO 2002, vol.2442/2002, 2002. | zh_TW |
dc.relation.reference (參考文獻) | [8] D.-W. Wang, C.-J. Liau, Y.-T. Chiang, and T.-S. Hsu,“Information theoretical analysis of two-party secret computation,” Data and Applications Security XX, Lecture Notes in Computer Science, vol. 4127, pp. 310–317, 2006. | zh_TW |
dc.relation.reference (參考文獻) | [9] C.-H. Shen, J. Zhan, D.-W. Wang, T.-S. Hsu, and C.-J. Liau, “Information-theoretically secure number product protocol,” in ICMLC ’07: International Conference on Machine Learning and Cybernetics, vol. 5, 19-22 Aug. 2007, pp. 3006–3011. | zh_TW |
dc.relation.reference (參考文獻) | [10] J. D. Nielsen and M. I. Schwartzbach, “A domain specific programming language for secure multiparty computation,” in PLAS ’07: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security. New York, NY, USA: ACM, 2007, pp. 21–30. | zh_TW |