Cargando…
The secure judgment of graphic similarity against malicious adversaries and its applications
With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, n...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030665/ https://www.ncbi.nlm.nih.gov/pubmed/36944671 http://dx.doi.org/10.1038/s41598-023-30741-6 |
_version_ | 1784910429295738880 |
---|---|
author | Liu, Xin Xu, Yang Luo, Dan Xu, Gang Xiong, Neal Chen, Xiu-Bo |
author_facet | Liu, Xin Xu, Yang Luo, Dan Xu, Gang Xiong, Neal Chen, Xiu-Bo |
author_sort | Liu, Xin |
collection | PubMed |
description | With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, national defense, finance, life, and other fields, and has important research significance. In this paper, we study the similarity problem of geometric graphics. First, this paper proposes the adjacency matrix vector coding method of isomorphic graphics, and use the Paillier variant encryption cryptography to solve the problem of isomorphic graphics confidentiality under the semi-honest model. Using cryptography tools such as elliptic curve cryptosystem, zero-knowledge proof, and cut-choose method, this paper designs a graphic similarity security decision protocol that can resist malicious adversary attacks. The analysis shows that the protocol has high computational efficiency and has wide application value in terrain matching, mechanical parts, biomolecules, face recognition, and other fields. |
format | Online Article Text |
id | pubmed-10030665 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-100306652023-03-23 The secure judgment of graphic similarity against malicious adversaries and its applications Liu, Xin Xu, Yang Luo, Dan Xu, Gang Xiong, Neal Chen, Xiu-Bo Sci Rep Article With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, national defense, finance, life, and other fields, and has important research significance. In this paper, we study the similarity problem of geometric graphics. First, this paper proposes the adjacency matrix vector coding method of isomorphic graphics, and use the Paillier variant encryption cryptography to solve the problem of isomorphic graphics confidentiality under the semi-honest model. Using cryptography tools such as elliptic curve cryptosystem, zero-knowledge proof, and cut-choose method, this paper designs a graphic similarity security decision protocol that can resist malicious adversary attacks. The analysis shows that the protocol has high computational efficiency and has wide application value in terrain matching, mechanical parts, biomolecules, face recognition, and other fields. Nature Publishing Group UK 2023-03-21 /pmc/articles/PMC10030665/ /pubmed/36944671 http://dx.doi.org/10.1038/s41598-023-30741-6 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Liu, Xin Xu, Yang Luo, Dan Xu, Gang Xiong, Neal Chen, Xiu-Bo The secure judgment of graphic similarity against malicious adversaries and its applications |
title | The secure judgment of graphic similarity against malicious adversaries and its applications |
title_full | The secure judgment of graphic similarity against malicious adversaries and its applications |
title_fullStr | The secure judgment of graphic similarity against malicious adversaries and its applications |
title_full_unstemmed | The secure judgment of graphic similarity against malicious adversaries and its applications |
title_short | The secure judgment of graphic similarity against malicious adversaries and its applications |
title_sort | secure judgment of graphic similarity against malicious adversaries and its applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030665/ https://www.ncbi.nlm.nih.gov/pubmed/36944671 http://dx.doi.org/10.1038/s41598-023-30741-6 |
work_keys_str_mv | AT liuxin thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xuyang thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT luodan thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xugang thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xiongneal thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT chenxiubo thesecurejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT liuxin securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xuyang securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT luodan securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xugang securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT xiongneal securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications AT chenxiubo securejudgmentofgraphicsimilarityagainstmaliciousadversariesanditsapplications |