• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ÇÐȸÁö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ÇÐȸÁö > µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)

µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)

Current Result Document : 10 / 14 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ¾ÈÀüÇÑ ¹®¼­ °Ë»öÀ» À§ÇÑ ÀúÂ÷¿ø º¯È¯ ±â¹ÝÀÇ 2´Ü°è ÇÁ·ÎÅäÄÝ
¿µ¹®Á¦¸ñ(English Title) Lower Dimensional Transformation-based 2-Step Protocol for Secure Similar Document Detection
ÀúÀÚ(Author) ±è»óÇÊ   ±æ¸í¼±   ÃÖÇüÁø   ±èÀåȯ   ¹®¾ç¼¼   Sang-Pil Kim   Myeong-Seon Gil   Hyung-Jin Choi   Jang-Hwan Kim   Yang-Sae Moon  
¿ø¹®¼ö·Ïó(Citation) VOL 32 NO. 02 PP. 0051 ~ 0060 (2016. 08)
Çѱ۳»¿ë
(Korean Abstract)
¾ÈÀüÇÑ À¯»ç ¹®¼­ °Ë»ö(secure similar document detection: SSDD)Àº µÎ ÆÄƼ°¡ ¼­·ÎÀÇ ¹Î°¨ÇÑ ¹®¼­´Â °ø°³ÇÏÁö ¾ÊÀ¸¸é¼­µµ À¯»ç ¹®¼­¸¦ ÆǺ°ÇÏ´Â ±â¹ýÀÌ´Ù. º» ³í¹®¿¡¼­´Â ÀúÂ÷¿ø º¯È¯À» »ç¿ëÇÏ¿© SSDD¸¦ È¿À²ÀûÀ¸·Î ¼öÇàÇÏ´Â 2-´Ü°è ÇÁ·ÎÅäÄÝÀ» Á¦½ÃÇÑ´Ù. ¿ì¼±, ±âÁ¸ 1-´Ü°è ÇÁ·ÎÅäÄÝÀÌ °íÂ÷¿ø ¹®¼­ º¤ÅÍ¿¡ ´ëÇØ ½É°¢ÇÑ ÄÄÇ»Æà ¹× Åë½Å ¿À¹öÇìµå¸¦ ¹ß»ý½ÃÅ´À» ºÐ¼®ÇÑ´Ù. ´ÙÀ½À¸·Î, °¡Àå °£´ÜÇÑ ÀúÂ÷¿ø º¯È¯ÀÎ RP(random projection)¸¦ »ç¿ëÇÑ 2-´Ü°è ÇÁ·ÎÅäÄÝÀ» Á¦½ÃÇÏ°í, ±× Á¤È®¼ºÀ» Áõ¸íÇÑ´Ù. ¸¶Áö¸·À¸·Î, RPÀÇ ³·Àº ÇÊÅ͸µ È¿°ú¸¦ °³¼±Çϱâ À§ÇØ DF(document frequency)¸¦ ÀúÂ÷¿ø º¯È¯À¸·Î »ç¿ëÇÑ 2-´Ü°è ÇÁ·ÎÅäÄÝÀ» Á¦½ÃÇÑ´Ù. ½ÇÇè °á°ú, Á¦¾ÈÇÑ DF ±â¹ÝÀÇ 2-´Ü°è ÇÁ·ÎÅäÄÝÀº ±âÁ¸ 1-´Ü°è ÇÁ·ÎÅäÄÝ¿¡ ºñÇØ ¼º´ÉÀ» ÃÖ´ë 147¹è±îÁö Çâ»ó½ÃŲ °ÍÀ¸·Î ³ªÅ¸³µ´Ù.
¿µ¹®³»¿ë
(English Abstract)
SSDD(secure similar document detection) identifies similar documents of two parties while not disclosing their sensitive documents. In this paper we propose an efficient two-step approach for SSDD by using the lower-dimensional transformation. We first analyze that the existing 1-step protocol causes serious computing and communications overhead. To solve this problem, we next propose a 2-step protocol based on RP(random projection), the simplest lower-dimensional transformation and prove its correctness. We also propose another 2-step protocol by using DF(document frequency) to improve the filtering effect of RP. Finally, we empirically show that the DF-based 2-step protocol significantly outperforms the base protocol by up to 147 times.
Å°¿öµå(Keyword) ¾ÈÀüÇÑ À¯»ç ¹®¼­ °Ë»ö   ÄÚ»çÀÎ À¯»çµµ   ÀúÂ÷¿ø º¯È¯   ¹®¼­ ºóµµ   Secure Similar Document Detection   Cosine Similarity Measure   Lower-dimensional Transformation   Document Frequency  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå