Private Multi-party Matrix Multiplication and Trust Computations

被引:2
|
作者
Dumas, Jean-Guillaume [1 ]
Lafourcade, Pascal [2 ]
Orfila, Jean-Baptiste [1 ]
Puys, Maxime [3 ]
机构
[1] Univ Grenoble Alpes, CNRS, LJK, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
[2] Univ Clermont Auvergne, LIMOS, Campus Univ Cezeaux,BP 86, F-63172 Aubiere, France
[3] Univ Grenoble Alpes, CNRS, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
关键词
Secure Multiparty Computation (MPC); Distributed Matrix Multiplication; Trust Evaluation; Proverif;
D O I
10.5220/0005957200610072
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [41] Multi-Party Quantum Private Comparison with Qudit Shifting Operation
    Duan, Ming-Yi
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (10) : 3079 - 3085
  • [42] Optimal Lower Bound for Differentially Private Multi-party Aggregation
    Chan, T-H. Hubert
    Shi, Elaine
    Song, Dawn
    ALGORITHMS - ESA 2012, 2012, 7501 : 277 - 288
  • [43] Secure Multi-party Computation of Differentially Private Heavy Hitters
    Boehler, Jonas
    Kerschbaum, Florian
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2361 - 2377
  • [44] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [45] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [46] Multi-Party Quantum Private Comparison with Qudit Shifting Operation
    Duan Ming-Yi
    International Journal of Theoretical Physics, 2020, 59 : 3079 - 3085
  • [47] A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)
    Johnson, Matthew
    Owen, Ralph
    SECURITY PROTOCOLS XVI, 2011, 6615 : 180 - 190
  • [48] Threshold quantum secret sharing between multi-party and multi-party
    YANG YuGuang1
    2 State Key Laboratory of Integrated Services Network
    3 State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences)
    4 State Key Laboratory of Networking and Switching Technology
    Science China(Physics,Mechanics & Astronomy), 2008, (09) : 1308 - 1315
  • [49] Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations
    Silaghi, MC
    IEEE/WIC INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2003, : 609 - 613
  • [50] Threshold quantum secret sharing between multi-party and multi-party
    YuGuang Yang
    QiaoYan Wen
    Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1308 - 1315