Private Multi-party Matrix Multiplication and Trust Computations

被引:2
|
作者
Dumas, Jean-Guillaume [1 ]
Lafourcade, Pascal [2 ]
Orfila, Jean-Baptiste [1 ]
Puys, Maxime [3 ]
机构
[1] Univ Grenoble Alpes, CNRS, LJK, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
[2] Univ Clermont Auvergne, LIMOS, Campus Univ Cezeaux,BP 86, F-63172 Aubiere, France
[3] Univ Grenoble Alpes, CNRS, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
关键词
Secure Multiparty Computation (MPC); Distributed Matrix Multiplication; Trust Evaluation; Proverif;
D O I
10.5220/0005957200610072
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
引用
下载
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [1] Dual protocols for private multi-party matrix multiplication and trust computations
    Dumas, Jean-Guillaume
    Lafourcade, Pascal
    Orfila, Jean-Baptiste
    Puys, Maxime
    COMPUTERS & SECURITY, 2017, 71 : 51 - 70
  • [2] Improved Constructions for Secure Multi-Party Batch Matrix Multiplication
    Zhu, Jinbao
    Yan, Qifa
    Tang, Xiaohu
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (11) : 7673 - 7690
  • [3] Quantum secure multi-party computational geometry based on multi-party summation and multiplication
    Dou, Zhao
    Wang, Yifei
    Liu, Zhaoqian
    Bi, Jingguo
    Chen, Xiubo
    Li, Lixiang
    QUANTUM SCIENCE AND TECHNOLOGY, 2024, 9 (02)
  • [4] Secure multi-party computations of geometric intersections
    Li, Shundong
    Dai, Yiqi
    Wang, Daoshun
    Luo, Ping
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2007, 47 (10): : 1692 - 1695
  • [5] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [6] Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
    Blass, Erik-Oliver
    Kerschbaum, Florian
    COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 295 - 319
  • [7] GCSA codes with noise alignment for secure coded multi-party batch matrix multiplication
    Chen Z.
    Jia Z.
    Wang Z.
    Jafar S.A.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 306 - 316
  • [8] GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
    Chen, Zhen
    Jia, Zhuqing
    Wang, Zhiying
    Jafar, Syed A.
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 227 - 232
  • [9] Atomic secure multi-party multiplication with low communication
    Cramer, Ronald
    Damgard, Ivan
    de Haan, Robbert
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 329 - +
  • [10] Multi-Party Private Function Evaluation for RAM
    Ji, Keyu
    Zhang, Bingsheng
    Lu, Tianpei
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1252 - 1267