Multiple Factor Ambiguous Pattern Recognition Based on Secure Multi-Party Computation - An Important Future Technology in Engineering Application

Article Preview

Abstract:

Ambiguous pattern recognition is a very important technology in the field of science including engineering application nowadays, it uses methods of fuzzy mathematics enabling the computer to recognize and judge the objective things. But, the research on ambiguous pattern recognition rarely involves the field of security, while in fact both the participant of the pattern recognition and the database need to protect their privacy. This paper mainly introduces the secure multi-party computation into the field of ambiguous pattern recognition, raises solution for the secure multi factor ambiguous pattern recognition under the half honest model, and proves the validity and security of the protocol.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1801-1803

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] WangXuhua, ChenShouyu. Multi-layer fuzzy pattern recognition model and the application in slope stability assessment. Journal of Liaoning Technical University. 2006: 855-857.

Google Scholar

[2] FU Hai-dong, YUAN Xi-guo. Design of an immune model based on fuzzy pattern recognition. Journal of Computer Applications, 2007. 1 : 89-91.

Google Scholar

[3] Yao A.C. Protocols for secure computations [A]. In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science [C]. 1982: 160-164.

DOI: 10.1109/sfcs.1982.38

Google Scholar

[4] O. Goldreich, S. Micali and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing. 1987: 218-229.

DOI: 10.1145/28395.28420

Google Scholar

[5] M. Ben-or, S. Goldwasser, A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. ACM STOC'88: 1-10.

DOI: 10.1145/62212.62213

Google Scholar

[6] D. Chaum, C. Crépeau, I. Damgard. Multi-party Unconditionally Secure Protocols, Proc. Of ACM STOC'88: 11-19.

DOI: 10.1145/62212.62214

Google Scholar

[7] S. Goldwasser. Multi-party Computations: Past and Present. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA USA. 1997, 8: 1-6.

DOI: 10.1145/259380.259405

Google Scholar

[8] Cachin C, Micali S, Stadler M. Computationally Private Information Retrieval with Polyloga- rithmic communication. In: Slem J, ed. Proc. of the Advances in Cryptology- EUROCRYPT'99. Lecture Notes in Computer Science. Vol. 1592, Springer-Verlag. 1999: 402-414.

DOI: 10.1007/3-540-48910-x_28

Google Scholar

[9] Cachin C. Efficient Private Bidding and Auctions with an Oblivious Third Party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery. 1999: 120-127.

DOI: 10.1145/319709.319726

Google Scholar