信息网络安全 ›› 2025, Vol. 25 ›› Issue (11): 1643-1657.doi: 10.3969/j.issn.1671-1122.2025.11.001

• 专题论文:机密计算 • 上一篇    下一篇

融合机密计算的数据安全处理研究进展

朱辉(), 方云依, 王枫为, 许伟   

  1. 西安电子科技大学网络与信息安全学院西安 710126
  • 收稿日期:2025-05-25 出版日期:2025-11-10 发布日期:2025-12-02
  • 通讯作者: 朱辉 zhuhui@xidian.edu.cn
  • 作者简介:朱辉(1981—),男,河南,教授,博士,主要研究方向为数据安全、隐私保护和应用密码学|方云依(1995—),女,浙江,博士研究生,主要研究方向为机密计算、数据安全与隐私保护|王枫为(1993—),男,河南,副教授,博士,主要研究方向为数据安全与隐私保护|许伟(1999—),男,湖南,博士研究生,主要研究方向为联邦学习、隐私推理
  • 基金资助:
    国家重点研发计划(2022YFB4501500);国家重点研发计划(2022YFB4501501);国家自然科学基金(U22B2030);国家自然科学基金(62302360);国家自然科学基金(62572376);陕西省重点研发计划(2024SF2-GJHX-37)

Research Progress on Data Security Processing Integrating Confidential Computing

ZHU Hui(), FANG Yunyi, WANG Fengwei, XU Wei   

  1. School of Cyber Engineering, Xidian University, Xi’an 710126, China
  • Received:2025-05-25 Online:2025-11-10 Published:2025-12-02

摘要:

在数据要素、数据安全、法律法规、隐私保护等多种因素的作用下,数据安全处理逐渐成为未来数据的主要利用方式。安全多方计算、密码学、匿名化和差分隐私技术是现有数据安全处理方案构造的基石。然而,安全多方计算协议通常需要各计算参与方之间进行多轮交互以完成固定运算,带来较大的通信开销;密码学技术在性能和功能上存在短板;匿名化和差分隐私技术会对原始数据进行泛化、加扰等处理,使数据的可用性下降。为解决上述问题,将可信执行环境(TEE)与传统数据安全处理技术进行结合,成为了当前学术界和工业界的研究热点。文章从研究背景与发展现状、代表性工作进展等方面对现有TEE与数据安全处理融合的方案进行了分析,在此基础上,提出了TEE与密态计算融合的安全模型,并对未来的发展趋势进行了展望和总结。

关键词: 机密计算, 密态计算, 数据安全处理, 融合安全模型

Abstract:

Driven by the increasing recognition of data as a critical asset, alongside rising concerns over data security, legal and regulatory compliance, and privacy protection, encrypted data computation is anticipated to become the dominant approach for data utilization in the future. Traditional methods rely heavily on anonymization and cryptographic techniques serve as the foundational building blocks. However, anonymization-based security enhancement strategies often compromise data utility, reducing its availability, while existing cryptographic schemes suffer from limitations in both performance and functionality. To overcome these challenges, the integration of Trusted Execution Environments (TEE) with conventional encrypted computation techniques has emerged as a focal point of research in both academia and industry. This study reviewed existing solutions that combined TEEs with encrypted data computation, analyzing them in terms of research background, current progress, and representative works. Based on this analysis, a secure model integrating TEEs and encrypted computation was proposed, and potential future research directions were explored.

Key words: confidential computing, encrypted computation, secure data processing, integrated security model

中图分类号: