Efficient Secure Multiparty Subset Computation

被引:1
|
作者
Zhou, Sufang [1 ]
Li, Shundong [1 ]
Dou, Jiawei [2 ]
Geng, Yaling [1 ]
Liu, Xin [1 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China
[2] Shaanxi Normal Univ, Sch Math & Informat Sci, Xian 710062, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
SET;
D O I
10.1155/2017/9717580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure subset problem is important in secure multiparty computation, which is a vital field in cryptography. Most of the existing protocols for this problemcan only keep the elements of one set private, while leaking the elements of the other set. In other words, they cannot solve the secure subset problem perfectly. While a few studies have addressed actual secure subsets, these protocols were mainly based on the oblivious polynomial evaluations with inefficient computation. In this study, we first design an efficient secure subset protocol for sets whose elements are drawn from a known set based on a new encoding method and homomorphic encryption scheme. If the elements of the sets are taken from a large domain, the existing protocol is inefficient. Using the Bloom filter and homomorphic encryption scheme, we further present an efficient protocol with linear computational complexity in the cardinality of the large set, and this is considered to be practical for inputs consisting of a large number of data. However, the second protocol that we design may yield a false positive. This probability can be rapidly decreased by reexecuting the protocol with different hash functions. Furthermore, we present the experimental performance analyses of these protocols.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [22] Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation
    Olalia, Romulo L., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 209 - 219
  • [23] Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average
    Duan, Hongwei
    Du, Runmeng
    Wei, Qiong
    Wang, Wenli
    Liu, Xin
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 412 - 415
  • [24] Efficient optimisation framework for convolutional neural networks with secure multiparty computation
    Berry, Cate
    Komninos, Nikos
    COMPUTERS & SECURITY, 2022, 117
  • [25] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345
  • [26] Secure Multiparty Computation with Minimal Interaction
    Ishai, Yuval
    Kushilevitz, Eyal
    Paskin-Cherniavsky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 577 - 594
  • [27] Absentia: Secure Multiparty Computation on Ethereum
    Demirag, Didem
    Clark, Jeremy
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, 2021, 12676 : 381 - 396
  • [28] Analysis of Data in Secure Multiparty Computation
    Shaikh, Zulfa
    Puntambekar, D. M.
    Pathak, Pushpa
    Bhati, Dinesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 731 - 733
  • [29] Trust Enabled Secure Multiparty Computation
    Dong, Renren
    Kresman, Ray
    2010 14TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV 2010), 2010, : 531 - 536
  • [30] Secure Multiparty Computation in arbitrary rings
    Prunescu, Mihai
    2021 23RD INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2021), 2021, : 283 - 290