隐私计算从萌芽到落地应用,有哪些“关键时刻”?
“一个民族,千百万人里面才出一个天才;人世间数百万个闲暇的小时流逝过去,方始出现一个真正的历史性时刻,人类星光璀璨的时辰。”
——斯蒂芬·茨威格《人类群星闪耀时》
萌芽期(1949年-1982年)
探索期(1983年-1999年)
成长期(2000年-2018年)
应用期(2019年至今)
来源:中国网
参考资料:
李凤华,李晖,牛犇.隐私计算理论与技术
中国移动通信联合会,中科院信工所,中国信通院. 2021隐私机密计算蓝皮书
交通银行.隐私计算金融应用蓝皮书
中国信通院.联邦学习场景应用研究报告(2022年)
北京金融科技产业联盟.隐私计算技术金融应用研究报告
中国移动.隐私计算应用白皮书(2021)
微众银行,毕马威. 2021隐私计算行业研究报告:深潜数据蓝海
艾瑞咨询. 2022年中国隐私计算行业研究报告
参考文献:
1. Shannon CE. Communication theory of secrecy systems. The Bell System Technical Journal. 1949 Oct;28(4):656–715.
2. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976 Nov;22(6):644–54.
3. Calderbank. The rsa cryptosystem: history, algorithm, primes. Chicago: math uchicago edu [Internet]. Available from: http://math.uchicago.edu/~may/VIGRE/VIGRE2007/REUPapers/INCOMING/REU+paper.pdf
4. Rivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. Foundations of secure [Internet]. 1978; Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.500.3989&rep=rep1&type=pdf
5. Shamir A. How to share a secret. Commun ACM. 1979 Nov;22(11):612–3.
6. Blakley. Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop on. 1979. p. 313.
7. Rabin MO. How To Exchange Secrets with Oblivious Transfer. Cryptology ePrint Archive [Internet]. 2005 [cited 2022 May 28]; Available from: https://eprint.iacr.org/2005/187
8. Yao AC. Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982). 1982. p. 160–4.
9. Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof-systems [Internet]. Proceedings of the seventeenth annual ACM symposium on Theory of computing - STOC’85. 1985. Available from: http://dx.doi.org/10.1145/22145.22178
10. Yao ACC. How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). 1986. p. 162–7.
11. Goldreich O, Micali S, Wigderson A. How to Play ANY Mental Game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM; 1987. p. 218–29. (STOC’87).
12. Cheung DW, Han J, Ng VT, Fu AW, Fu Y. A fast distributed algorithm for mining association rules. In: Fourth International Conference on Parallel and Distributed Information Systems. 1996. p. 31–42.
13. Paillier P. Public-Key Cryptosystem Based on Discrete Logarithm Residues. EUROCRYPT 1999 [Internet]. 1999 [cited 2022 May 28]; Available from: https://ci.nii.ac.jp/naid/10021850608/
14. Dwork C. Differential Privacy. In: Automata, Languages and Programming. Springer Berlin Heidelberg; 2006. p. 1–12.
15. Hardware Working Group. ADVANCED TRUSTED ENVIRONMENT: OMTP TR1 [Internet]. OMTP Limited; 2009. Available from: https://www.gsma.com/newsroom/wp-content/uploads/2012/03/omtpadvancedtrustedenvironmentomtptr1v11.pdf
16. Gentry C. A fully homomorphic encryption scheme [Internet]. 2009. Available from: https://search.proquest.com/openview/93369e65682e50979432340f1fdae44e/1?pq-origsite=gscholar&cbl=18750
17. Wang S, Jiang X, Wu Y, Cui L, Cheng S, Ohno-Machado L. EXpectation Propagation LOgistic REgRession (EXPLORER): distributed privacy-preserving online model learning. J Biomed Inform. 2013 Jun;46(3):480–96.
18. Intel. Intel Architecture Instruction Set Extensions Programming Reference [Internet]. Intel; 2015. Available from: https://www.intel.com/content/www/us/en/developer/overview.html#page=36
19. Kone ny J, Brendan McMahan H, Yu FX, Richtárik P, Suresh AT, Bacon D. Federated Learning: Strategies for Improving Communication Efficiency [Internet]. arXiv [cs.LG]. 2016. Available from: http://arxiv.org/abs/1610.05492
20. Gao D, Liu Y, Huang A, Ju C, Yu H, Yang Q. Privacy-preserving Heterogeneous Federated Transfer Learning. In: 2019 IEEE International Conference on Big Data (Big Data). 2019. p. 2552–9.
热门文章:
好书相赠 | 《元宇宙进化逻辑——用确定性的逻辑诠释不确定的未来》