检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张文政 汤殿华[1,2,3] ZHANG Wenzheng;TANG Dianhua(National Key Laboratory of Security Communication,Chengdu Sichuan 610041,China;No.30 Institute of CETC,Chengdu Sichuan 610041,China;School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu Sichuan 611731,China)
机构地区:[1]保密通信全国重点实验室,四川成都610041 [2]中国电子科技集团公司第三十研究所,四川成都610041 [3]电子科技大学计算机科学与工程学院,四川成都611731
出 处:《信息安全与通信保密》2024年第11期1-9,共9页Information Security and Communications Privacy
基 金:国家重点研发计划(2023YFB3106200)。
摘 要:数据要素已经成为国家战略,高效打通数据孤岛,安全保障数据要素流通,成为重要的研究课题。密态计算技术以密码学为核心,能够在加密数据上执行密文计算、检索、访问控制等功能,是解决数据安全和保障数据要素流通的关键技术。首先,介绍了密态计算的背景以及技术内涵,阐述密态计算所采用的同态加密、安全多方计算等技术路线;其次,综述了美国在密态计算领域算法、软件工具、芯片等方面的重大项目,并分析得出其具有体系化部署、密码加速突破、产业链协同战略特点;最后,给出密态计算发展相关建议。The data element has become a national strategy.Efficiently bridging data silos and securing the flow of data elements become important research topics.Centered on cryptography,encrypted computing is able to perform cipher computing,retrieval,and access control operations on encrypted data,which is the key technology to address data security and guarantee the flow of data elements.This paper introduces the background and technical connotation of encrypted computing,describes the homomorphic encryption,secure multi-party computing and other technical routes used in encrypted computing,summarizes the major projects of the United States in the field of algorithms,software tools,chips,etc.,and analyzes and concludes that it has the systematic deployment,cryptographic intensification of the breakthroughs,and industrial chain synergistic strategic characteristics,and finally gives the recommendations related to the development of encrypted computing.
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7