Cargando…

The secure judgment of graphic similarity against malicious adversaries and its applications

With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, n...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Xin, Xu, Yang, Luo, Dan, Xu, Gang, Xiong, Neal, Chen, Xiu-Bo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030665/
https://www.ncbi.nlm.nih.gov/pubmed/36944671
http://dx.doi.org/10.1038/s41598-023-30741-6
_version_ 1784910429295738880
author Liu, Xin
Xu, Yang
Luo, Dan
Xu, Gang
Xiong, Neal
Chen, Xiu-Bo
author_facet Liu, Xin
Xu, Yang
Luo, Dan
Xu, Gang
Xiong, Neal
Chen, Xiu-Bo
author_sort Liu, Xin
collection PubMed
description With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, national defense, finance, life, and other fields, and has important research significance. In this paper, we study the similarity problem of geometric graphics. First, this paper proposes the adjacency matrix vector coding method of isomorphic graphics, and use the Paillier variant encryption cryptography to solve the problem of isomorphic graphics confidentiality under the semi-honest model. Using cryptography tools such as elliptic curve cryptosystem, zero-knowledge proof, and cut-choose method, this paper designs a graphic similarity security decision protocol that can resist malicious adversary attacks. The analysis shows that the protocol has high computational efficiency and has wide application value in terrain matching, mechanical parts, biomolecules, face recognition, and other fields.
format Online
Article
Text
id pubmed-10030665
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-100306652023-03-23 The secure judgment of graphic similarity against malicious adversaries and its applications Liu, Xin Xu, Yang Luo, Dan Xu, Gang Xiong, Neal Chen, Xiu-Bo Sci Rep Article With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, national defense, finance, life, and other fields, and has important research significance. In this paper, we study the similarity problem of geometric graphics. First, this paper proposes the adjacency matrix vector coding method of isomorphic graphics, and use the Paillier variant encryption cryptography to solve the problem of isomorphic graphics confidentiality under the semi-honest model. Using cryptography tools such as elliptic curve cryptosystem, zero-knowledge proof, and cut-choose method, this paper designs a graphic similarity security decision protocol that can resist malicious adversary attacks. The analysis shows that the protocol has high computational efficiency and has wide application value in terrain matching, mechanical parts, biomolecules, face recognition, and other fields. Nature Publishing Group UK 2023-03-21 /pmc/articles/PMC10030665/ /pubmed/36944671 http://dx.doi.org/10.1038/s41598-023-30741-6 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Liu, Xin
Xu, Yang
Luo, Dan
Xu, Gang
Xiong, Neal
Chen, Xiu-Bo
The secure judgment of graphic similarity against malicious adversaries and its applications
title The secure judgment of graphic similarity against malicious adversaries and its applications
title_full The secure judgment of graphic similarity against malicious adversaries and its applications
title_fullStr The secure judgment of graphic similarity against malicious adversaries and its applications
title_full_unstemmed The secure judgment of graphic similarity against malicious adversaries and its applications
title_short The secure judgment of graphic similarity against malicious adversaries and its applications
title_sort secure judgment of graphic similarity against malicious adversaries and its applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030665/
https://www.ncbi.nlm.nih.gov/pubmed/36944671
http://dx.doi.org/10.1038/s41598-023-30741-6
work_keys_str_mv AT liuxin thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xuyang thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT luodan thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xugang thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xiongneal thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT chenxiubo thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT liuxin securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xuyang securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT luodan securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xugang securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT xiongneal securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications
AT chenxiubo securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications