Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 基於多方安全計算之算術運算
Arithmetic operations for secure multi-party computation
作者 蕭名宏
Hsiao, Ming Hung
貢獻者 陳恭
Cheng, Kung
蕭名宏
Hsiao, Ming Hung
關鍵詞 安全多方計算
浮點數
轉譯器
Secure Multi-party Computation
floating number
translator
日期 2009
上傳時間 8-Dec-2010 12:08:32 (UTC+8)
摘要 資訊安全的研究裡,運用安全多方計算的方法,可使得多方在不洩漏各自私有資訊的條件下完成某種函式的計算。其中一種做法是利用scalar product來當作計算的基礎演算邏輯單元,並進而建構其他更複雜的安全多方計算。
根據目前現有的安全多方運算協定,可再加以定義出一些基本的運算規則,像是一般的程式語言中常用到的變數型態,如整數、浮點數、布林值,我們可定義出安全的秘密資料形態來,並且要能達到算數計算就必須擁有數值處理的能力,如基本的四則運算等,所以提供了相關聯的安全計算協定。根據安全多方計算的運算平台,可具有處理算術計算的能力,使得可處理一般安全計算的問題。
我們並提供一個script轉譯工具,使得使用者可自行撰寫自己的安全多方計算程式,並可利用此工具來自動將使用者寫的程式碼轉成安全多方運算平台可接受的程式碼,如此一來,解決安全多方計算的問題將會變得更為容易。
Protocols for secure multi-party computation (SMC) allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. This thesis concerns the implementation SMC using of a set of information theoretically secure protocols based on scalar product protocol. This main characteristic of this approach is taking the scalar product computation as the basic building, and then use it to construct more complex computation protocols. We developed an SMC implementation framework for both integers and floating numbers which comprises a set of arithmetic operations that manipulate secret values among involved parties using the scalar product protocol as the basis. Such a library of arithmetic operations is call building blocks. Besides, to ease the writing of more complex user-defined protocols, we developed a simple scripting language and a translation tool that converts user script code to SMC code, which is code composed of the building blocks we developed.
參考文獻 [1] C. Yao,“Protocols for secure computation,” in Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, November 1982, pp. 160–164.
[2] Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” in STOC ’87: Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1987, pp. 218–229.
[3] P. Bogetoft, D.L. Christensen, I. Dåmgard, M. Geisler, T. Jakobsen, M. Krøigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach and T. Toft. Multi-Party Computation Goes Live Cryptology ePrint Archive, Report 2008/068, 2008.
[4] W. Du and Z. Zhan, “A practical approach to solve secure multi-party computation problems,” in NSPW ‘02: Proceedings of the 2002 Workshop on New Security Paradigms. New York, NY, USA: ACM Press, 2002, pp. 127–135.
[5] D. Beaver, “Commodity-based cryptography (extended abstract),” in STOC ’97: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1997, pp. 446–455.
[6] I.-C. Wang, C.-H. Shen, T.-S. Hsu, C.-C. Liau, D.-W. Wang, and J. Zhan, “Towards empirical aspects of secure scalar product,” in ISA ’08: IEEE International Conference on Information Security and Assurance, April 2008, pp. 573–578.
[7] J. Algesheimer, J. Camenisch, and V. Shoup, “Efficient computation modulo a shared secret with application to the generation of shared safe-prime products,” Advances in Cryptology X CRYPTO 2002, vol.2442/2002, 2002.
[8] D.-W. Wang, C.-J. Liau, Y.-T. Chiang, and T.-S. Hsu,“Information theoretical analysis of two-party secret computation,” Data and Applications Security XX, Lecture Notes in Computer Science, vol. 4127, pp. 310–317, 2006.
[9] C.-H. Shen, J. Zhan, D.-W. Wang, T.-S. Hsu, and C.-J. Liau, “Information-theoretically secure number product protocol,” in ICMLC ’07: International Conference on Machine Learning and Cybernetics, vol. 5, 19-22 Aug. 2007, pp. 3006–3011.
[10] J. D. Nielsen and M. I. Schwartzbach, “A domain specific programming language for secure multiparty computation,” in PLAS ’07: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security. New York, NY, USA: ACM, 2007, pp. 21–30.
描述 碩士
國立政治大學
資訊科學學系
97753002
98
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0097753002
資料類型 thesis
dc.contributor.advisor 陳恭zh_TW
dc.contributor.advisor Cheng, Kungen_US
dc.contributor.author (Authors) 蕭名宏zh_TW
dc.contributor.author (Authors) Hsiao, Ming Hungen_US
dc.creator (作者) 蕭名宏zh_TW
dc.creator (作者) Hsiao, Ming Hungen_US
dc.date (日期) 2009en_US
dc.date.accessioned 8-Dec-2010 12:08:32 (UTC+8)-
dc.date.available 8-Dec-2010 12:08:32 (UTC+8)-
dc.date.issued (上傳時間) 8-Dec-2010 12:08:32 (UTC+8)-
dc.identifier (Other Identifiers) G0097753002en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/49472-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 97753002zh_TW
dc.description (描述) 98zh_TW
dc.description.abstract (摘要) 資訊安全的研究裡,運用安全多方計算的方法,可使得多方在不洩漏各自私有資訊的條件下完成某種函式的計算。其中一種做法是利用scalar product來當作計算的基礎演算邏輯單元,並進而建構其他更複雜的安全多方計算。
根據目前現有的安全多方運算協定,可再加以定義出一些基本的運算規則,像是一般的程式語言中常用到的變數型態,如整數、浮點數、布林值,我們可定義出安全的秘密資料形態來,並且要能達到算數計算就必須擁有數值處理的能力,如基本的四則運算等,所以提供了相關聯的安全計算協定。根據安全多方計算的運算平台,可具有處理算術計算的能力,使得可處理一般安全計算的問題。
我們並提供一個script轉譯工具,使得使用者可自行撰寫自己的安全多方計算程式,並可利用此工具來自動將使用者寫的程式碼轉成安全多方運算平台可接受的程式碼,如此一來,解決安全多方計算的問題將會變得更為容易。
zh_TW
dc.description.abstract (摘要) Protocols for secure multi-party computation (SMC) allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. This thesis concerns the implementation SMC using of a set of information theoretically secure protocols based on scalar product protocol. This main characteristic of this approach is taking the scalar product computation as the basic building, and then use it to construct more complex computation protocols. We developed an SMC implementation framework for both integers and floating numbers which comprises a set of arithmetic operations that manipulate secret values among involved parties using the scalar product protocol as the basis. Such a library of arithmetic operations is call building blocks. Besides, to ease the writing of more complex user-defined protocols, we developed a simple scripting language and a translation tool that converts user script code to SMC code, which is code composed of the building blocks we developed.en_US
dc.description.tableofcontents 一、介紹 1
1.1 背景
1.2 目標
二、文獻回顧 5
2.1 SECRET SHARING
2.2 SCALAR PRODUCT PROTOCOL
2.3 A COMMODITY-BASED APPROACH TO SCALAR PRODUCT PROTOCOL
2.4 INFORMATION-THEORY BASED SECURITY DEFINITION
2.5 THE COMPOSITIONAL THEOREM
2.6 BUILDING BLOCKS
三、研究方法與系統架構 11
3.1 SECURE DATA TYPE
3.2 SECURE SCALAR PRODUCT MODULE
3.3 BUILDING BLOCK PROTOCOLS
3.4 SYSTEM ARCHITECTURE
四、演算法設計 20
4.1 PRELIMINARY
4.2 PRIMITIVE AND USEFUL BUILDING BLOCKS
4.2.1 zn_to_z2 Protocol
4.2.2 z2_to_zn Protocol
4.2.3 negative? , less_than, great_than Protocol
4.2.4 if_then_else Protocol
4.3 PROTOCOL FOR INTEGER CLASS
4.3.1 Plus
4.3.2 Minus
4.3.3 Product
4.3.4 Division
4.4 PROTOCOL FOR FLOAT (DOUBLE) CLASS
4.4.1 Float Plus & Float Minus
4.4.2 Float Product
4.4.3 Float Division
4.5 A TRANSLATOR BASED PROTOCOL DEVELOPMENT TOOL
4.5.1 Translation Tool
4.5.2 Operation Statement Translation
4.5.3 Constant Number Translation
4.5.4 If Statement Translation
五、實驗與評估 41
5.1 實驗設計
5.2 實驗數據
5.3 實驗討論
六、結論 54
6.1 貢獻
6.2 未來研究
七、參考文獻 56
zh_TW
dc.format.extent 1708976 bytes-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0097753002en_US
dc.subject (關鍵詞) 安全多方計算zh_TW
dc.subject (關鍵詞) 浮點數zh_TW
dc.subject (關鍵詞) 轉譯器zh_TW
dc.subject (關鍵詞) Secure Multi-party Computationen_US
dc.subject (關鍵詞) floating numberen_US
dc.subject (關鍵詞) translatoren_US
dc.title (題名) 基於多方安全計算之算術運算zh_TW
dc.title (題名) Arithmetic operations for secure multi-party computationen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) [1] C. Yao,“Protocols for secure computation,” in Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, November 1982, pp. 160–164.zh_TW
dc.relation.reference (參考文獻) [2] Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” in STOC ’87: Proceedings of the 19th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1987, pp. 218–229.zh_TW
dc.relation.reference (參考文獻) [3] P. Bogetoft, D.L. Christensen, I. Dåmgard, M. Geisler, T. Jakobsen, M. Krøigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach and T. Toft. Multi-Party Computation Goes Live Cryptology ePrint Archive, Report 2008/068, 2008.zh_TW
dc.relation.reference (參考文獻) [4] W. Du and Z. Zhan, “A practical approach to solve secure multi-party computation problems,” in NSPW ‘02: Proceedings of the 2002 Workshop on New Security Paradigms. New York, NY, USA: ACM Press, 2002, pp. 127–135.zh_TW
dc.relation.reference (參考文獻) [5] D. Beaver, “Commodity-based cryptography (extended abstract),” in STOC ’97: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM Press, 1997, pp. 446–455.zh_TW
dc.relation.reference (參考文獻) [6] I.-C. Wang, C.-H. Shen, T.-S. Hsu, C.-C. Liau, D.-W. Wang, and J. Zhan, “Towards empirical aspects of secure scalar product,” in ISA ’08: IEEE International Conference on Information Security and Assurance, April 2008, pp. 573–578.zh_TW
dc.relation.reference (參考文獻) [7] J. Algesheimer, J. Camenisch, and V. Shoup, “Efficient computation modulo a shared secret with application to the generation of shared safe-prime products,” Advances in Cryptology X CRYPTO 2002, vol.2442/2002, 2002.zh_TW
dc.relation.reference (參考文獻) [8] D.-W. Wang, C.-J. Liau, Y.-T. Chiang, and T.-S. Hsu,“Information theoretical analysis of two-party secret computation,” Data and Applications Security XX, Lecture Notes in Computer Science, vol. 4127, pp. 310–317, 2006.zh_TW
dc.relation.reference (參考文獻) [9] C.-H. Shen, J. Zhan, D.-W. Wang, T.-S. Hsu, and C.-J. Liau, “Information-theoretically secure number product protocol,” in ICMLC ’07: International Conference on Machine Learning and Cybernetics, vol. 5, 19-22 Aug. 2007, pp. 3006–3011.zh_TW
dc.relation.reference (參考文獻) [10] J. D. Nielsen and M. I. Schwartzbach, “A domain specific programming language for secure multiparty computation,” in PLAS ’07: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security. New York, NY, USA: ACM, 2007, pp. 21–30.zh_TW