Private Multi-party Matrix Multiplication and Trust Computations

被引:2
|
作者
Dumas, Jean-Guillaume [1 ]
Lafourcade, Pascal [2 ]
Orfila, Jean-Baptiste [1 ]
Puys, Maxime [3 ]
机构
[1] Univ Grenoble Alpes, CNRS, LJK, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
[2] Univ Clermont Auvergne, LIMOS, Campus Univ Cezeaux,BP 86, F-63172 Aubiere, France
[3] Univ Grenoble Alpes, CNRS, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
关键词
Secure Multiparty Computation (MPC); Distributed Matrix Multiplication; Trust Evaluation; Proverif;
D O I
10.5220/0005957200610072
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [31] Multi-party quantum private comparison with an almost-dishonest third party
    Huang, Sheng-Liang
    Hwang, Tzonelih
    Gope, Prosanta
    QUANTUM INFORMATION PROCESSING, 2015, 14 (11) : 4225 - 4235
  • [32] A Verifiable Secret Sharing Scheme without Using Multi-Party Computations
    Makino, Takumi
    Kamidoi, Yoko
    Wakabayashi, Shin'ichi
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 845 - 850
  • [33] A cost-effective quantum protocol for secure multi-party multiplication
    Kartick Sutradhar
    Hari Om
    Quantum Information Processing, 2021, 20
  • [34] Multi-party quantum private comparison with an almost-dishonest third party
    Sheng-Liang Huang
    Tzonelih Hwang
    Prosanta Gope
    Quantum Information Processing, 2015, 14 : 4225 - 4235
  • [35] Two Shannon-type Problems on Secure Multi-party Computations
    Lee, Eun Jee
    Abbe, Emmanuel
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1287 - 1293
  • [36] A cost-effective quantum protocol for secure multi-party multiplication
    Sutradhar, Kartick
    Om, Hari
    QUANTUM INFORMATION PROCESSING, 2021, 20 (11)
  • [37] Multi-Party Quantum Private Comparison Based on Bell States
    Wu, Wanqing
    Wu, Jiahui
    Guo, Lingna
    ENTROPY, 2023, 25 (08)
  • [38] Verifiable Multi-party Computation with Perfectly Private Audit Trail
    Cuvelier, Edouard
    Pereira, Olivier
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 367 - 385
  • [39] A Novel Authenticated Multi-party Key Agreement for Private Cloud
    He, Tuo
    Ma, Maode
    Ma, Wenping
    He, Bingsheng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3776 - 3781
  • [40] Multi-Party Private Set Intersection in Vertical Federated Learning
    Lu, Linpeng
    Ding, Ning
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 707 - 714