Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Private-preserving determination problem of integer-interval positional relationship
MA Minyao, LIU Zhuo, XU Yi, WU Lian
Journal of Computer Applications    2020, 40 (9): 2657-2664.   DOI: 10.11772/j.issn.1001-9081.2020020149
Abstract325)      PDF (1024KB)(316)       Save
Integer-interval means the set of the left and right endpoints of the interval (which are integers) and all integers between them. The positional relationship between integer-intervals is the relation between the positions of two integer-intervals. Aiming at the positional relationship between integer-intervals, a secure two-party computation problem was proposed, in other words, a private-preserving determination problem of integer-interval positional relationship was proposed. In this problem, two users with private-preserving integer-intervals were helped to correctly determine the positional relationship between the two integer-intervals of them with the private preserved. Six positional relationships between two integer-intervals were defined, the 0-1 coding scheme of integer-intervals was given, and a determination rule for integer-interval positional relationship was proved. Then, based on the Goldwasser-Micali cryptosystem and semi-honest attacker model, a secure two-party computation protocol for solving the private-preserving determination problem of integer-interval positional relationship was designed. The protocol was proved to be both correct and secure, and the performance of the protocol was analyzed and explained.
Reference | Related Articles | Metrics
Privacy-preserving determination of integer point-interval relationship
MA Minyao, WU Lian, LIU Zhuo, XU Yi
Journal of Computer Applications    2020, 40 (7): 1983-1988.   DOI: 10.11772/j.issn.1001-9081.2020010091
Abstract366)      PDF (839KB)(402)       Save
The determination of the relationship between integer point and integer interval in the sense of privacy preserving is an important secure multi-party computation problem, but there are some defects in the existing solutions, such as low efficiency, privacy disclosure, and even possible wrong determination. Aiming at these defects, an improved secure two-party computation protocol for solving this determination problem was constructed. Firstly, analysis of the existing protocols was given and some shortcomings of the protocols were pointed out. Secondly, a new 0-1 coding rule for integer point and integer interval was defined, based on this, a necessary and sufficient condition for an integer point belonging to an integer interval was proved. Finally, by using the necessary and sufficient condition as the determination standard, a secure two-party computation protocol for determining wether the integer point belonging to the integer interval was proposed based on the Goldwasser-Micali encryption system, and its correctness and the security under the semi-honest model were proved. Analysis shows that compared with the existing solutions, the proposed protocol has better privacy preserving feature and will not output wrong results, in addition, both the computation complexity and the communication complexity of the protocol are reduced by about half while the round complexity remains the same.
Reference | Related Articles | Metrics
Privacy preserving Hamming distance computing problem of DNA sequences
MA Minyao, XU Yi, LIU Zhuo
Journal of Computer Applications    2019, 39 (9): 2636-2640.   DOI: 10.11772/j.issn.1001-9081.2019020247
Abstract567)      PDF (816KB)(298)       Save

DNA sequences carry important biological information of human bodies, how to compare multiple DNA sequences correctly with privacy preserving is an important problem. To a certain extent, Hamming distance characterizes the similarity between two DNA sequences. Therefore, the privacy preserving Hamming distance computing problem of DNA sequences was researched. First of all, the "0-1 Coding" of the DNA sequence was defined, which codes the DNA sequence with length n to a 0-1 string with length 4n, proving that the Hamming distance of two DNA sequences is a half of the Hamming distance of their "0-1 Coding" strings. Then, with the help of this conclusion, with the Goldwasser-Micali (GM) encryption algorithm taken as main encryption tool, a secure two-party computation protocol for computing the Hamming distance of two DNA sequences was proposed. It was shown that the protocol is both secure and correct under semi-honest attacker model. The proof of security based on a simulator was given. After then, the efficiency of the protocol was analyzed.

Reference | Related Articles | Metrics
Data scheduling strategy in P2P streaming system based on improved particle swarm optimization algorithm
LI Zhenxing LIU Zhuojun
Journal of Computer Applications    2013, 33 (04): 931-934.   DOI: 10.3724/SP.J.1087.2013.00931
Abstract868)      PDF (802KB)(511)       Save
Data scheduling strategy in Peer-to-Peer (P2P) media streaming is the key research of the P2P media streaming system. A Particle Swarm Optimization (PSO) algorithm was modified according to P2P streaming data scheduling features and the style of digital encoding string for the algorithm was proposed in this paper. The data scheduling strategy to choose the data chunk took account of resource urgency and scarcity degree. The modified discrete particle swarm algorithm was used to choose the peers to get the optimal scheduling peers set. In order to verify the feasibility and effectiveness of the algorithm, experiments were done to simulate the convergence of the algorithm, the scheduling time, the P2P network uplink bandwidth utilization and the load balancing of peers.
Reference | Related Articles | Metrics
Price adaptive medicine association rule learning and medicine recommendation
LIU Zhuoming,CHEN Gan,CHEN Biyi,HUANG Ling,WANG Changdong
Journal of Computer Applications    DOI: 10.11772/j.issn.1001-9081.2019091596
Accepted: 19 September 2019