A Collusion-Resistant Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust

被引:8
|
作者
Melchor, Carlos Aguilar [1 ]
Ait-Salem, Boussad [1 ]
Gaborit, Philippe [1 ]
机构
[1] Univ Limoges, CNRS, UMR 6172, Xlim Lab, F-87000 Limoges, France
关键词
Privacy-preserving computation of trust; Secure multi-party computation; Secure scalar product; Superposed sending;
D O I
10.1109/NCA.2009.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private scalar product protocols have proved to be interesting in various applications such as data mining, data integration, trust computing, etc. In 2007, Yao et al. proposed a distributed scalar product protocol with application to privacy-preserving computation of trust [1]. This protocol is split in two phases: an homorphic encryption computation; and a private multi-party summation protocol. The summation protocol has two drawbacks: first, it generates a non-negligible communication overhead; and second, it introduces a security flaw. The contribution of this present paper is two-fold. We first prove that the protocol of [1] is not secure in the semi-honest model by showing that it is not resistant to collusion attacks and we give an example of a collusion attack, with only four participants. Second, we propose to use a superposed sending round as an alternative to the multi-party summation protocol, which results in better security properties and in a reduction of the communication costs. In particular, regarding security, we show that the previous scheme was vulnerable to collusions of three users whereas in our proposal we can fix t is an element of [1..n - 1] and define a protocol resisting to collusions of up to t users.
引用
收藏
页码:140 / 147
页数:8
相关论文
共 50 条
  • [1] Private distributed scalar product protocol with application to privacy-preserving computation of trust
    Yao, Danfeng
    Tamassia, Roberto
    Proctor, Seth
    TRUST MANAGEMENT, 2007, 238 : 1 - +
  • [2] Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining
    Ge, Xin-Jing
    Zhu, Jian-Ming
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 359 - 369
  • [3] Collusion-resistant, Lightweight and Privacy-preserving Authentication Protocol for IoV
    Lalouani, Wassila
    Younis, Mohamed
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [4] A high collusion-resistant approach to distributed privacy-preserving data mining
    Urabe, Shintaro
    Wang, Jiahong
    Kodama, Eiichiro
    Takata, Toyoo
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 326 - +
  • [5] A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System
    Xu, Chang
    Shen, Xiaodong
    Zhu, Liehuang
    Zhang, Yan
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [6] CR-SMTC: Privacy Preserving Collusion-Resistant Multi-Party Trust Computation
    Fathabadi, Zohre Fath
    Nogoorani, Sadegh Dorri
    Hemmatyar, Ali Mohammad
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 167 - 172
  • [7] Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids
    Baza, Mohamed
    Pazos-Revilla, Marbin
    Sherif, Ahmed
    Nabil, Mahmoud
    Aljohani, Abdulah Jeza
    Mahmoud, Mohamed
    Alasmary, Waleed
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2226 - 2243
  • [8] Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion
    Li, Meng
    Gao, Jianbo
    Zhang, Zijian
    Zhu, Liehuang
    Lal, Chhagan
    Conti, Mauro
    Alazab, Mamoun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (04) : 5139 - 5151
  • [9] Efficient scalar product protocol and its privacy-preserving application
    Zhu, Youwen
    Takagi, Tsuyoshi
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (01) : 1 - 19
  • [10] Experimental analysis of a privacy-preserving scalar product protocol
    Yang, ZQ
    Wright, RN
    Subramaniam, H
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01): : 47 - 52