Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [1] Verifiable Multi-party Computation with Perfectly Private Audit Trail
    Cuvelier, Edouard
    Pereira, Olivier
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 367 - 385
  • [2] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    [J]. 2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [3] Function-Dependent Commitments for Verifiable Multi-party Computation
    Schabhuser, Lucas
    Butin, Denis
    Demirel, Denise
    Buchmann, Johannes
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 289 - 307
  • [4] Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
    Faust, Sebastian
    Hazay, Carmit
    Kretzler, David
    Schlosser, Benjamin
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 782 - 811
  • [5] Committed oblivious transfer and private multi-party computation
    Crepeau, C
    vandeGraaf, J
    Tapp, A
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 110 - 123
  • [6] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
  • [7] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [8] A Scalable Blockchain Approach for Trusted Computation and Verifiable Simulation in Multi-Party Collaborations
    Raman, Ravi Kiran
    Vaculin, Roman
    Hind, Michael
    Remy, Sekou L.
    Pissadaki, Eleftheria K.
    Bore, Nelson Kibichii
    Daneshvar, Roozbeh
    Srivastava, Biplav
    Varshney, Kush R.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 277 - 284
  • [9] Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board
    Li, Xiaotong
    Wang, Hao
    Li, Zhi
    Wu, Lei
    Wei, Xiaochao
    Su, Ye
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (04) : 1698 - 1711
  • [10] CONSTRUCTING AND COMPRESSING FRAMES IN BLOCKCHAIN-BASED VERIFIABLE MULTI-PARTY COMPUTATION
    Raman, Ravi Kiran
    Varshney, Kush R.
    Vaculin, Roman
    Bore, Nelson Kibichii
    Remy, Sekou L.
    Pissadaki, Eleftheria K.
    Hind, Michael
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 7500 - 7504