Secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion

被引:0
|
作者
LI Shundong**
机构
关键词
secure multi-party computation; Yao’s millionaires’ problem; 1-out-of-m oblivious transfer; set-inclusion problem;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Secure multi-party computation is a focus of international cryptography in recent years. Protocols for Yao’s millionaires’ problem have become an important building block of many secure multi-party computation protocols. Their efficiency are crucial to the efficiency of many secure multi-party computation protocols. Unfortunately, known protocols for Yao’s millionaires’ problem have high computational complexity or communication complexity. In this study, based on the 1-out-of-m oblivious transfer and set-inclusion problem, we propose a new protocol to solve this problem. This new protocol is very efficient in terms of both computational and communication complexities. Its privacy-preserving property is also proved by simulation paradigm which is generally accepted in the study of secure multi-party computation. We also compare the information leakage of our new protocol and the known protocols.
引用
收藏
页码:851 / 856
页数:6
相关论文
共 50 条
  • [1] Secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion
    Li, SD
    Dai, YQ
    You, QY
    PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2005, 15 (09) : 851 - 856
  • [2] Secure multi-party computation of set-inclusion and graph-inclusion
    Li, Shundong
    Si, Tiange
    Dai, Yiqi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42 (10): : 1647 - 1653
  • [3] Practical protocol for Yao's millionaires problem enables secure multi-party computation of metrics and efficient privacy-preserving k-NN for large data sets
    Amirbekyan, Artak
    Estivill-Castro, Vladimir
    KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 21 (03) : 327 - 363
  • [4] Practical protocol for Yao’s millionaires problem enables secure multi-party computation of metrics and efficient privacy-preserving k-NN for large data sets
    Artak Amirbekyan
    Vladimir Estivill-Castro
    Knowledge and Information Systems, 2009, 21 : 327 - 363
  • [5] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [6] Secure multi-party computation protocol for sorting problem
    School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
    不详
    Hsi An Chiao Tung Ta Hsueh, 2008, 2 (231-233+255): : 231 - 233
  • [7] Secure multi-party computation protocol for sequencing problem
    TANG ChunMing 1
    2State Key Laboratory of Information Security
    3 School of Mathematics and Computational Science
    ScienceChina(InformationSciences), 2011, 54 (08) : 1654 - 1662
  • [8] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [9] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [10] Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
    Chen Z.
    Li S.
    Wang D.
    Huang Q.
    Dong L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2017, 54 (07): : 1549 - 1556