Private Multi-party Matrix Multiplication and Trust Computations

被引:2
|
作者
Dumas, Jean-Guillaume [1 ]
Lafourcade, Pascal [2 ]
Orfila, Jean-Baptiste [1 ]
Puys, Maxime [3 ]
机构
[1] Univ Grenoble Alpes, CNRS, LJK, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
[2] Univ Clermont Auvergne, LIMOS, Campus Univ Cezeaux,BP 86, F-63172 Aubiere, France
[3] Univ Grenoble Alpes, CNRS, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
关键词
Secure Multiparty Computation (MPC); Distributed Matrix Multiplication; Trust Evaluation; Proverif;
D O I
10.5220/0005957200610072
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
引用
下载
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [21] Practical Multi-Party Private Set Intersection Protocols
    Bay, Asli
    Erkin, Zekeriya
    Hoepman, Jaap-Henk
    Samardjiska, Simona
    Vos, Jelle
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1 - 15
  • [22] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [23] A Multi-Party Functional Signatures Scheme for Private Blockchain
    Zhou, Quan
    Zheng, Yulong
    Wei, Kaijun
    Chen, Minhui
    Zeng, Zhikang
    CRYPTOGRAPHY, 2023, 7 (02)
  • [24] Secure Multi-Party Quantum Private Information Query
    Hong Tao
    Xiaoqing Tan
    Tingting Song
    International Journal of Theoretical Physics, 2020, 59 : 1099 - 1108
  • [25] Efficient private multi-party numerical records matching
    Han, Shumin
    Shen, Derong
    Nie, Tiezheng
    Kou, Yue
    Yu, Ge
    FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (05)
  • [26] Committed oblivious transfer and private multi-party computation
    Crepeau, C
    vandeGraaf, J
    Tapp, A
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 110 - 123
  • [27] Social-Aware Decentralization for Secure and Scalable Multi-Party Computations
    Tang, Yuzhe
    Soundarajan, Sucheta
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 246 - 251
  • [28] A Real World Application of Secure Multi-party Computations (Transcript of Discussion)
    Johnson, Matthew
    SECURITY PROTOCOLS XVI, 2011, 6615 : 191 - 197
  • [29] Two Shannon-type Problems on Secure Multi-party Computations
    Lee, Eun Jee
    Abbe, Emmanuel
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1287 - 1293
  • [30] A Secure Multi-party Signature Scheme Based on Trust Mechanism
    Cheng, Yage
    Hu, Mingsheng
    Wang, Lipeng
    Lei, Yanfang
    Fu, Junjun
    Gong, Bei
    Ma, Wei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 119 - 132