A Collusion-Resistant Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust

被引:8
|
作者
Melchor, Carlos Aguilar [1 ]
Ait-Salem, Boussad [1 ]
Gaborit, Philippe [1 ]
机构
[1] Univ Limoges, CNRS, UMR 6172, Xlim Lab, F-87000 Limoges, France
关键词
Privacy-preserving computation of trust; Secure multi-party computation; Secure scalar product; Superposed sending;
D O I
10.1109/NCA.2009.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private scalar product protocols have proved to be interesting in various applications such as data mining, data integration, trust computing, etc. In 2007, Yao et al. proposed a distributed scalar product protocol with application to privacy-preserving computation of trust [1]. This protocol is split in two phases: an homorphic encryption computation; and a private multi-party summation protocol. The summation protocol has two drawbacks: first, it generates a non-negligible communication overhead; and second, it introduces a security flaw. The contribution of this present paper is two-fold. We first prove that the protocol of [1] is not secure in the semi-honest model by showing that it is not resistant to collusion attacks and we give an example of a collusion attack, with only four participants. Second, we propose to use a superposed sending round as an alternative to the multi-party summation protocol, which results in better security properties and in a reduction of the communication costs. In particular, regarding security, we show that the previous scheme was vulnerable to collusions of three users whereas in our proposal we can fix t is an element of [1..n - 1] and define a protocol resisting to collusions of up to t users.
引用
收藏
页码:140 / 147
页数:8
相关论文
共 50 条
  • [21] Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting
    Megias, David
    Qureshi, Amna
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 71 : 147 - 172
  • [22] Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys
    Rong, Hong
    Wang, Huimei
    Huang, Kun
    Liu, Jian
    Xian, Ming
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016, 2016, 9937 : 248 - 258
  • [23] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [24] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [25] Application of oblivious transfer protocol in distributed data mining with privacy-preserving
    Wang, Weiping
    Deng, Bing
    Li, Zhepeng
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 283 - 285
  • [26] Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication
    Liu, Wen-Jie
    Li, Zi-Xian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (11) : 4456 - 4469
  • [27] A Distributed Trust Framework for Privacy-Preserving Machine Learning
    Abramson, Will
    Hall, Adam James
    Papadopoulos, Pavlos
    Pitropakis, Nikolaos
    Buchanan, William J.
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020, 2020, 12395 : 205 - 220
  • [28] A General Approach to Distributed and Privacy-Preserving Heuristic Computation
    Stolba, Michal
    Urbanovska, Michaela
    Fiser, Daniel
    Komenda, Antonin
    AGENTS AND ARTIFICIAL INTELLIGENCE, ICAART 2019, 2019, 11978 : 55 - 71
  • [29] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [30] A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC"
    Schneider, Thomas
    Treiber, Amos
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (03) : 543 - 546