A Secure Scalar Product Protocol Against Malicious Adversaries

被引:0
|
作者
Bo Yang
Yong Yu
Chung-Huang Yang
机构
[1] Shaanxi Normal University,School of Computer Science
[2] University of Electronic Science and Technology of China,School of Computer Science and Engineering
[3] National Kaohsiung Normal University,Graduate Institute of Information and Computer Education
关键词
secure multi-party computation; secure scalar product protocol; verifiable encryption;
D O I
暂无
中图分类号
学科分类号
摘要
A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
引用
收藏
页码:152 / 158
页数:6
相关论文
共 50 条
  • [1] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158
  • [2] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    [J]. Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [3] Secure blockchain bidding auction protocol against malicious adversaries
    Dai, Xiaobing
    Liu, Jiajing
    Liu, Xin
    Tu, Xiaofen
    Wang, Ruexue
    [J]. HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [4] The secure judgment of graphic similarity against malicious adversaries and its applications
    Xin Liu
    Yang Xu
    Dan Luo
    Gang Xu
    Neal Xiong
    Xiu-Bo Chen
    [J]. Scientific Reports, 13 (1)
  • [5] The secure judgment of graphic similarity against malicious adversaries and its applications
    Liu, Xin
    Xu, Yang
    Luo, Dan
    Xu, Gang
    Xiong, Neal
    Chen, Xiu-Bo
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
  • [6] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [7] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [8] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    [J]. Journal of Cryptology, 2015, 28 : 312 - 350
  • [9] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
    Zhu, Ruiyu
    Huang, Yan
    Cassel, Darion
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257
  • [10] Malicious adversaries against secure state estimation: Sparse sensor attack design
    Lu, An-Yang
    Yang, Guang-Hong
    [J]. AUTOMATICA, 2022, 136