Private Multi-party Matrix Multiplication and Trust Computations

被引:2
|
作者
Dumas, Jean-Guillaume [1 ]
Lafourcade, Pascal [2 ]
Orfila, Jean-Baptiste [1 ]
Puys, Maxime [3 ]
机构
[1] Univ Grenoble Alpes, CNRS, LJK, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
[2] Univ Clermont Auvergne, LIMOS, Campus Univ Cezeaux,BP 86, F-63172 Aubiere, France
[3] Univ Grenoble Alpes, CNRS, 700 Av Cent,IMAG CS 40700, F-38058 Grenoble 9, France
关键词
Secure Multiparty Computation (MPC); Distributed Matrix Multiplication; Trust Evaluation; Proverif;
D O I
10.5220/0005957200610072
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [41] Quantum Secure Multi-party Private Set Intersection Cardinality
    Liu, Bai
    Zhang, Mingwu
    Shi, Runhua
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 1992 - 2007
  • [42] Multi-Party Quantum Private Comparison with Qudit Shifting Operation
    Duan, Ming-Yi
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (10) : 3079 - 3085
  • [43] Differentially Private Multi-Party Data Release for Linear Regression
    Wu, Ruihan
    Yang, Xin
    Yao, Yuanshun
    Sun, Jiankai
    Liu, Tianyi
    Weinberger, Kilian Q.
    Wang, Chong
    UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, VOL 180, 2022, 180 : 2128 - 2137
  • [44] Optimal Lower Bound for Differentially Private Multi-party Aggregation
    Chan, T-H. Hubert
    Shi, Elaine
    Song, Dawn
    ALGORITHMS - ESA 2012, 2012, 7501 : 277 - 288
  • [45] Multi-Party Private Set Intersection Protocols for Practical Applications
    Bay, Asli
    Erkin, Zeki
    Alishahi, Mina
    Vos, Jelle
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 515 - 522
  • [46] Secure Multi-party Computation of Differentially Private Heavy Hitters
    Boehler, Jonas
    Kerschbaum, Florian
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2361 - 2377
  • [47] Quantum Secure Multi-party Private Set Intersection Cardinality
    Bai Liu
    Mingwu Zhang
    Runhua Shi
    International Journal of Theoretical Physics, 2020, 59 : 1992 - 2007
  • [48] Private and Secure Over-the-Air Multi-Party Communication
    Brune, Jan Jonas
    Frey, Matthias
    Klement, Felix
    Bjelakovic, Igor
    Katzenbeisser, Stefan
    Stanczak, Slawomir
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 1697 - 1701
  • [49] Multi-Party Quantum Private Comparison with Qudit Shifting Operation
    Duan Ming-Yi
    International Journal of Theoretical Physics, 2020, 59 : 3079 - 3085
  • [50] A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)
    Johnson, Matthew
    Owen, Ralph
    SECURITY PROTOCOLS XVI, 2011, 6615 : 180 - 190