计算机应用 ›› 2017, Vol. 37 ›› Issue (6): 1593-1598.DOI: 10.11772/j.issn.1001-9081.2017.06.1593

• 网络空间安全 • 上一篇    下一篇

一类可抵抗恶意攻击的隐私集合交集协议

罗小双1,2, 杨晓元1,2, 王绪安1,2   

  1. 1. 武警工程大学 电子技术系, 西安 710086;
    2. 网络与信息安全武警部队重点实验室, 西安 710086
  • 收稿日期:2016-12-06 修回日期:2017-02-09 出版日期:2017-06-10 发布日期:2017-06-14
  • 通讯作者: 杨晓元
  • 作者简介:罗小双(1992-),男,陕西安康人,硕士研究生,CCF会员,主要研究方向:信息安全、密码学;杨晓元(1959-),男,湖南湘潭人,教授,硕士,主要研究方向:信息安全、密码学;王绪安(1981-),男,湖北公安人,副教授,博士,主要研究方向:信息安全、密码学。
  • 基金资助:
    国家自然科学基金资助项目(U1636114,61572521,61402531);陕西省自然科学基金资助项目(2014JM8300,2014JQ8358,2015JQ6231,2016JQ6037)。

A private set intersection protocol against malicious attack

LUO Xiaoshuang1,2, YANG Xiaoyuan1,2, WANG Xu'an1,2   

  1. 1. Department of Electronic Technology, Engineering College of the Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Key Laboratory of Network & Information Security under the Chinese Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2016-12-06 Revised:2017-02-09 Online:2017-06-10 Published:2017-06-14
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (U1636114, 61572521, 61772472), the Natural Science Foundation of Shaanxi Province (2014JM8300, 2014JQ8358, 2015JQ6231, 2016JQ6037).

摘要: 针对安全两方计算中隐私集合交集计算问题,提出了一种改进的基于Bloom Filter数据结构的隐私集合交集协议。该协议能够保证双方在各自隐私安全的前提下,计算出两者数据集合的交集,其中只有一方能够计算出交集元素,另外一方无法计算得到交集,并且双方都不能获得或推测出对方除交集以外的任何集合元素,确保了参与双方敏感信息的安全保密。所提协议引入了基于身份的密钥协商协议,能够抵抗非法用户的恶意攻击,达到隐私保护和安全防御的目的,抵御了密钥泄露的风险,减少了加解密的运算量,并且具备支持较大规模集合数据的运算能力。

关键词: 隐私保护, 隐私集合交集, 不经意传输, 秘密共享, 密钥协商

Abstract: Aiming at the problem of private set intersection calculation in secure two-party computation, an improved private set intersection protocol based on Bloom Filter was proposed. On the premise of ensuring the security of both parties about their own privacy, the intersection of two datasets could be calculated. Only one party can calculate the intersection elements whereas the other party can't calculate the intersection. Both parties can't obtain or infer any other set elements except the intersection of the other party, which ensures the security of sensitive information for both parties. The proposed protocol introduced the identity-based key agreement protocol, which can resist the malicious attacks of illegal users, protect the privacy and achieve the security defense, resist the risk of key disclosure, reduce the amount of encryption and decryption. The proposed protocol has the ability to support large scale data computation.

Key words: privacy preserving, Private Set Intersection (PSI), oblivious transfer, secret sharing, key agreement

中图分类号: