Advanced Search
Volume 34 Issue 2
Mar.  2012
Turn off MathJax
Article Contents
Xia Feng, Yang Bo, Zhang Ming-Wu, Ma Sha, Lei Tao. Secure Two-party Computation for Set Intersection and Set Equality Problems Based on LWE[J]. Journal of Electronics & Information Technology, 2012, 34(2): 462-467. doi: 10.3724/SP.J.1146.2011.00541
Citation: Xia Feng, Yang Bo, Zhang Ming-Wu, Ma Sha, Lei Tao. Secure Two-party Computation for Set Intersection and Set Equality Problems Based on LWE[J]. Journal of Electronics & Information Technology, 2012, 34(2): 462-467. doi: 10.3724/SP.J.1146.2011.00541

Secure Two-party Computation for Set Intersection and Set Equality Problems Based on LWE

doi: 10.3724/SP.J.1146.2011.00541
  • Received Date: 2011-06-07
  • Rev Recd Date: 2011-09-19
  • Publish Date: 2012-02-19
  • Using Learning With Errors (LWE) in the lattice, the equation test is converted to a decryption ability of a random string. It solves the secure two-party computation such as the relationship of an element and a set, set intersection, and set equation etc. The simulations in the semi-honest model show that these two-party solutions are secure and efficient. Compared with protocols based on security assumptions in number theory, the proposed protocols not only have lower computational complexity without exponential operations but can also resist quantum attack because of the assumption on lattice problem.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2624) PDF downloads(879) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return