期刊文献+
共找到162篇文章
< 1 2 9 >
每页显示 20 50 100
Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
1
作者 黄征 龚征 李强 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期112-116,共5页
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ... This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 展开更多
关键词 secret share secure multi-party computation asynchronous network
原文传递
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing
2
作者 Wenbin Yu Hao Feng +3 位作者 Yinsong Xu Na Yin Yadang Chen Zhi-Xin Yang 《Computers, Materials & Continua》 SCIE EI 2021年第4期241-252,共12页
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure wa... Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or communication.In this paper,we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model,which is able to be accelerated by quantum algorithms.A novel multi-party phase estimation algorithm and the related quantum circuit are proposed by using a distributed Oracle operator with iterations.The proved theoretical communication complexity of this algorithm shows it can give the phase estimation before applying multi-party computing efficiently without increasing any additional complexity.Moreover,a practical problem of multi-party dating investigated shows it can make a successful estimation of the number of solution in advance with zero communication complexity by utilizing its special statistic feature.Sufficient simulations present the correctness,validity and efficiency of the proposed estimation method. 展开更多
关键词 Edge computing security multi-party computing quantum algorithm phase estimation communication complexity
在线阅读 下载PDF
Secure planar convex hull protocol for large-scaled point sets in semi-honest model
3
作者 孙茂华 Zhu Hongliang Li Qi 《High Technology Letters》 EI CAS 2015年第4期471-478,共8页
Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has... Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has been proposed efficiently to solve the above problems. Firstly, a novel priva- cy-preserving point-inclusion (PPPI) protocol is designed based on the classic homomorphic encryp- tion and secure cross product protocol, and it is demonstrated that the complexity of PPPI protocol is independent of the vertex size of the input convex hull. And then on the basis of the novel PPPI pro- tocol, an effective SPCH protocol is presented. Analysis shows that this SPCH protocol has a good performance for large-scaled point sets compared with previous solutions. Moreover, analysis finds that the complexity of our SPCH protocol relies on the size of the points on the outermost layer of the input point sets only. 展开更多
关键词 secure multi-party computation secure multi-party computational geometry (SMCG) secure planar convex hull protocol (SPCH) privacy-preserving point-inclusion protocol (PPPI) semi-honest model
在线阅读 下载PDF
A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
4
作者 Jian Shang Runmin Guan Wei Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2609-2626,共18页
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ... The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks. 展开更多
关键词 MICROGRID data security storage node trust degree directed acyclic graph data structure consensus mechanism secure multi-party computing blockchain
在线阅读 下载PDF
基于无服务器计算的多方数据库安全计算系统 被引量:2
5
作者 马旭阳 周小凯 +5 位作者 郑浩宇 崔斌 徐泉清 杨传辉 晏潇 江佳伟 《软件学报》 北大核心 2025年第3期1084-1106,共23页
联合多方数据库的安全计算可以在保护数据隐私的情况下,对多个数据库的私有数据进行联合查询或联合建模.这样的联合体通常是一个松散的组织,各参与的数据库可以随时离线,然而现有多方安全计算系统通常采用秘密共享等隐私计算方案,需要... 联合多方数据库的安全计算可以在保护数据隐私的情况下,对多个数据库的私有数据进行联合查询或联合建模.这样的联合体通常是一个松散的组织,各参与的数据库可以随时离线,然而现有多方安全计算系统通常采用秘密共享等隐私计算方案,需要参与者保持在线状态,导致系统的可用性较差.此外,现有系统对外提供服务时无法预知用户的数量以及请求速度,如果将系统部署在私有集群或者租用云计算平台的虚拟机,面对爆发式请求时系统延迟增大,在请求较少时又造成资源浪费,表现出较差的可扩展性.随着云计算技术的发展,无服务器计算(serverless computing)作为一种新的云原生部署范式出现,具有良好的弹性资源伸缩能力.在该工作中,提出了基于无服务器计算环境的系统架构和间接通信方案,实现了一套高可扩展、高可用的多方数据库安全计算系统,可以容忍数据库节点掉线,并且在用户请求流量发生变化时自动伸缩系统资源.基于阿里云和OceanBase数据库实现了系统原型并进行了充分的实验对比,结果显示该系统在低频查询、横向建模等任务上,在计算成本、系统性能和可扩展性方面优于现有系统,最高能够节省78%的计算成本、提升系统性能1.6倍,同时也分析了本系统对于复杂查询、纵向建模等任务存在的不足. 展开更多
关键词 云原生系统 无服务器计算 多方数据库安全计算
在线阅读 下载PDF
云计算网络安全等级保护测评系统的设计及功能测试 被引量:4
6
作者 乔木 《科学技术创新》 2025年第8期73-76,共4页
探究了云计算网络安全等级保护测评系统的设计要点,并对其基本功能的实现情况进行了测试。该系统采用B/S架构,客户端为Web浏览器,服务器包含表现层、业务逻辑层和数据层,与数据库之间进行双向通信。该系统的基本功能有用户管理、项目管... 探究了云计算网络安全等级保护测评系统的设计要点,并对其基本功能的实现情况进行了测试。该系统采用B/S架构,客户端为Web浏览器,服务器包含表现层、业务逻辑层和数据层,与数据库之间进行双向通信。该系统的基本功能有用户管理、项目管理、项目实施、风险分析与评价和报告管理五项。从测试情况来看,系统各项功能可以正常实现,在辅助测评人员高效、准确完成云计算网络安全等级保护测评工作方面发挥了重要作用。 展开更多
关键词 云计算 数据库 网络安全等级保护测评系统 风险分析
在线阅读 下载PDF
计算机网络与数据库的安全技术优化研究
7
作者 张世虎 《移动信息》 2025年第3期192-194,共3页
在数字时代,计算机网络与数据库已经成为企业与组织运作的重要部分。然而,由于网络攻击方式的多样性,传统的安全技术已很难应对日趋复杂的网络安全威胁,如何对安全技术进行优化就显得尤为重要。因此,文中对计算机网络与数据库的安全技... 在数字时代,计算机网络与数据库已经成为企业与组织运作的重要部分。然而,由于网络攻击方式的多样性,传统的安全技术已很难应对日趋复杂的网络安全威胁,如何对安全技术进行优化就显得尤为重要。因此,文中对计算机网络与数据库的安全技术优化进行了分析,并提出了有效的优化策略,保障了计算机网络相关工作的顺利开展,同时确保了数据库内的资料信息得到有效保管。 展开更多
关键词 计算机网络 数据库 安全技术
在线阅读 下载PDF
基于云计算的数据库通信安全检测系统
8
作者 刁家全 《通信电源技术》 2025年第2期10-12,共3页
针对云计算环境下数据库通信面临的诸多安全挑战,提出一种基于云计算的数据库通信安全检测系统。该系统集成数据采集、安全策略、检测分析及告警响应4大模块,利用深度包检测与智能策略生成技术,实现了对数据库通信中异常行为的有效识别... 针对云计算环境下数据库通信面临的诸多安全挑战,提出一种基于云计算的数据库通信安全检测系统。该系统集成数据采集、安全策略、检测分析及告警响应4大模块,利用深度包检测与智能策略生成技术,实现了对数据库通信中异常行为的有效识别。实验结果显示,系统在面对多种攻击类型时,检测准确率高于98%,平均延迟不超过4 ms,吞吐量不低于9.2 Gb/s,验证了其在保障云数据库安全方面的高效性与实用性。 展开更多
关键词 云计算 数据库安全 异常检测 智能策略
在线阅读 下载PDF
机房网络安全漏洞自动挖掘与定位方法研究
9
作者 刘青 《自动化应用》 2025年第18期270-272,共3页
传统的漏洞定位方法定位精度较低,为此,提出一种机房网络安全漏洞自动挖掘与定位方法。首先,设计机房网络安全态势感知模型,利用攻击关联性矩阵和网络态势评估函数,以精准感知机房网络的安全态势。然后,利用信息提取引擎和关联分析子模... 传统的漏洞定位方法定位精度较低,为此,提出一种机房网络安全漏洞自动挖掘与定位方法。首先,设计机房网络安全态势感知模型,利用攻击关联性矩阵和网络态势评估函数,以精准感知机房网络的安全态势。然后,利用信息提取引擎和关联分析子模块,并结合优化的目标函数和皮尔逊相关系数,对机房网络安全的漏洞进行自动挖掘。最后,建立漏洞数据库,并通过构建安全漏洞弧序列,引入蚁群算法,定位安全漏洞位置具体的网络节点。结果表明,该方法能够有效提升机房网络安全漏洞的定位精度,在不同场景下均无漏检和误检现象,具有实际应用价值。 展开更多
关键词 机房网络安全 安全态势感知 漏洞自动挖掘 漏洞定位 漏洞数据库
在线阅读 下载PDF
Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation 被引量:1
10
作者 Maryam Zarezadeh Hamid Mala Homa Khajeh 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第4期863-874,共12页
In software-defined networking(SDN),controllers are sinks of information such as network topology collected from switches.Organizations often like to protect their internal network topology and keep their network poli... In software-defined networking(SDN),controllers are sinks of information such as network topology collected from switches.Organizations often like to protect their internal network topology and keep their network policies private.We borrow techniques from secure multi-party computation(SMC)to preserve the privacy of policies of SDN controllers about status of routers.On the other hand,the number of controllers is one of the most important concerns in scalability of SMC application in SDNs.To address this issue,we formulate an optimization problem to minimize the number of SDN controllers while considering their reliability in SMC operations.We use Non-Dominated Sorting Genetic Algorithm II(NSGA-II)to determine the optimal number of controllers,and simulate SMC for typical SDNs with this number of controllers.Simulation results show that applying the SMC technique to preserve the privacy of organization policies causes only a little delay in SDNs,which is completely justifiable by the privacy obtained. 展开更多
关键词 software-defined NETWORKING (SDN) PRIVACY secure multi-party computation (SMC) structure function MULTI-OBJECTIVE optimization
原文传递
Concretely ecient secure multi-party computation protocols:survey and mor 被引量:2
11
作者 Dengguo Feng Kang Yang 《Security and Safety》 2022年第1期47-89,共43页
Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purel... Secure multi-party computation(MPC)allows a set of parties to jointly compute a function on their private inputs,and reveals nothing but the output of the function.In the last decade,MPC has rapidly moved from a purely theoretical study to an object of practical interest,with a growing interest in practical applications such as privacy-preserving machine learning(PPML).In this paper,we comprehensively survey existing work on concretely ecient MPC protocols with both semi-honest and malicious security,in both dishonest-majority and honest-majority settings.We focus on considering the notion of security with abort,meaning that corrupted parties could prevent honest parties from receiving output after they receive output.We present high-level ideas of the basic and key approaches for designing di erent styles of MPC protocols and the crucial building blocks of MPC.For MPC applications,we compare the known PPML protocols built on MPC,and describe the eciency of private inference and training for the state-of-the-art PPML protocols.Further-more,we summarize several challenges and open problems to break though the eciency of MPC protocols as well as some interesting future work that is worth being addressed.This survey aims to provide the recent development and key approaches of MPC to researchers,who are interested in knowing,improving,and applying concretely ecient MPC protocols. 展开更多
关键词 secure multi-party computation Privacy-preserving machine learning Secret sharings Garbled circuits Oblivious transfer and its arithmetic generalization
原文传递
Robust peer-to-peer learning via secure multi-party computation 被引量:1
12
作者 Yongkang Luo Wenjian Luo +2 位作者 Ruizhuo Zhang Hongwei Zhang Yuhui Shi 《Journal of Information and Intelligence》 2023年第4期341-351,共11页
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation.Peer-to-peer(P2P)federated learning f... To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model aggregation.Peer-to-peer(P2P)federated learning further improves the robustness of the system,in which there is no server and each client communicates directly with the other.For secure aggregation,secure multi-party computing(SMPC)protocols have been utilized in peer-to-peer manner.However,the ideal SMPC protocols could fail when some clients drop out.In this paper,we propose a robust peer-to-peer learning(RP2PL)algorithm via SMPC to resist clients dropping out.We improve the segmentbased SMPC protocol by adding a check and designing the generation method of random segments.In RP2PL,each client aggregates their models by the improved robust secure multi-part computation protocol when finishes the local training.Experimental results demonstrate that the RP2PL paradigm can mitigate clients dropping out with no significant degradation in performance. 展开更多
关键词 Federated learning Swarm learning secure multi-party computation Peer-to-peer learning
原文传递
Nearly universal and efficient quantum secure multi-party computation protocol
13
作者 Han Yushan Che Bichen +2 位作者 Liu Jiali Dou Zhao Di Junyu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第4期51-68,88,共19页
Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality h... Universality is an important property in software and hardware design.This paper concentrates on the universality of quantum secure multi-party computation(SMC)protocol.First of all,an in-depth study of universality has been conducted,and then a nearly universal protocol is proposed by using the Greenberger-Horne-Zeilinger(GHZ)-like state and stabilizer formalism.The protocol can resolve the quantum SMC problem which can be deduced as modulo subtraction,and the steps are simple and effective.Secondly,three quantum SMC protocols based on the proposed universal protocol:Quantum private comparison(QPC)protocol,quantum millionaire(QM)protocol,and quantum multi-party summation(QMS)protocol are presented.These protocols are given as examples to explain universality.Thirdly,analyses of the example protocols are shown.Concretely,the correctness,fairness,and efficiency are confirmed.And the proposed universal protocol meets security from the perspective of preventing inside attacks and outside attacks.Finally,the experimental results of the example protocols on the International Business Machines(IBM)quantum platform are consistent with the theoretical results.Our research indicates that our protocol is universal to a certain degree and easy to perform. 展开更多
关键词 UNIVERSALITY quantum secure multi-party computation security Greenberger-Horne-Zeilinger-like state simple operation
原文传递
Secure Two-Party Computational Geometry 被引量:37
14
作者 Shun-DongLi Yi-QiDai 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期258-263,共6页
Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a c... Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric. problems, and in doing so a building block is developed, the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems. 展开更多
关键词 secure multi-party computation oblivious transfer millionaire problem secure computation geometry PROTOCOL
原文传递
Secure blockchain bidding auction protocol against malicious adversaries
15
作者 Xiaobing Dai Jiajing Liu +2 位作者 Xin Liu Xiaofen Tu Ruexue Wang 《High-Confidence Computing》 EI 2024年第3期58-63,共6页
In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this ... In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party.The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography.It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary attacks.The security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is analyzed.The efficiency of the protocol is verified by simulating experiments,and the protocol has practical value. 展开更多
关键词 Blockchain secure multi-party computation Electronic bidding auction Malicious model Real/ideal model paradigm
在线阅读 下载PDF
计算机应用中的数据库安全管理研究 被引量:2
16
作者 辛玲 《信息与电脑》 2024年第5期218-220,共3页
在计算机应用中,数据库安全管理是一个至关重要的议题。随着信息技术的迅猛发展,数据库作为存储和处理海量数据的关键设施,其安全性直接关系到企业的运营和个人的信息安全。文章简要探讨计算机应用中的数据库安全管理问题,旨在提高人们... 在计算机应用中,数据库安全管理是一个至关重要的议题。随着信息技术的迅猛发展,数据库作为存储和处理海量数据的关键设施,其安全性直接关系到企业的运营和个人的信息安全。文章简要探讨计算机应用中的数据库安全管理问题,旨在提高人们对这一领域的认识,并提供实用的安全管理策略。 展开更多
关键词 计算机应用 数据库 安全管理
在线阅读 下载PDF
校园网络中的数据安全与防火墙技术应用 被引量:2
17
作者 常李霞 《集成电路应用》 2024年第9期164-165,共2页
阐述针对当前校园数据安全隐患,提出应用云计算、虚拟化、数据库加密技术、增强防火墙安全性的策略。分析表明,这些关键技术的应用可以有效提升校园防火墙的安全防护水平。
关键词 网络安全 防火墙 云计算 虚拟化 数据库加密
在线阅读 下载PDF
入侵检测技术在计算机数据库中的应用 被引量:1
18
作者 张文君 《移动信息》 2024年第6期147-150,共4页
随着信息技术的快速发展,计算机数据库成为攻击者的主要目标,入侵检测技术(IDT)逐渐成为维护网络安全的重要工具。IDT通过监控和分析网络流量,能有效识别和预防未授权的访问及恶意攻击。该技术不仅可以防御病毒和恶意软件,还能有效管理... 随着信息技术的快速发展,计算机数据库成为攻击者的主要目标,入侵检测技术(IDT)逐渐成为维护网络安全的重要工具。IDT通过监控和分析网络流量,能有效识别和预防未授权的访问及恶意攻击。该技术不仅可以防御病毒和恶意软件,还能有效管理内部威胁。在计算机数据库环境中,IDT能提高数据的真实性和有效性,确保系统的稳定运行。结合数据加密、访问控制、安全审计与监控等技术,可以形成更加全面的防御策略,为数据库提供多层次的保护。文中分析了IDT在计算机数据库中的应用,包括技术实现、挑战应对、成功案例以及与其他安全技术的综合应用。 展开更多
关键词 入侵检测技术 计算机数据库 网络安全 数据库安全
在线阅读 下载PDF
计算机软件开发中数据库安全设计的应用研究 被引量:1
19
作者 文见明 安杰 邱菊 《科学与信息化》 2024年第9期34-36,共3页
面对我国经济发展步伐的不断加快,各个行业都迎来了更多机遇,在这样的形势下,计算机发挥了重要作用,同时人们也对其安全性提出了更加严格的要求。技术人员十分关注计算机软件的设计,只有逐步强化软件的性能,才能满足当今社会对互联网环... 面对我国经济发展步伐的不断加快,各个行业都迎来了更多机遇,在这样的形势下,计算机发挥了重要作用,同时人们也对其安全性提出了更加严格的要求。技术人员十分关注计算机软件的设计,只有逐步强化软件的性能,才能满足当今社会对互联网环境的诸多要求。因此,本文围绕计算机软件开发中数据库安全设计的应用展开讨论,分析当前数据库开发的注意事项及测试问题,并结合一些数据,深入研究计算机软件开发中数据库安全设计的应用,可为相关人员提供一些借鉴。 展开更多
关键词 计算机软件 数据库开发 应用价值 安全设计
在线阅读 下载PDF
网络安全视域下医院信息管理计算机数据库的应用分析 被引量:1
20
作者 赵辉 《信息与电脑》 2024年第19期13-15,共3页
数字化信息管理不仅提高了医院的工作效率,还方便了患者和医疗工作者之间的信息交流,但其网络安全问题也日益凸显。文章介绍了计算机数据库的原理与特点,分析了数据库技术与医院信息系统的有机结合,并提出了网络安全下医院信息管理计算... 数字化信息管理不仅提高了医院的工作效率,还方便了患者和医疗工作者之间的信息交流,但其网络安全问题也日益凸显。文章介绍了计算机数据库的原理与特点,分析了数据库技术与医院信息系统的有机结合,并提出了网络安全下医院信息管理计算机数据库技术,以期为医院信息管理的安全性提供借鉴。 展开更多
关键词 网络安全 医院信息管理 计算机数据库
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部