Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [21] Private outsourced model predictive control via secure multi-party computation
    Adelipour, Saeed
    Haeri, Mohammad
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [22] Secure Multi-Party Computation in Differential Private Data with Data Integrity Protection
    Sundari, S.
    Ananthi, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 180 - 184
  • [23] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [24] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [25] Multi-Party Computation with Omnipresent Adversary
    Ghodosi, Hossein
    Pieprzyk, Josef
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 180 - +
  • [26] Privacy in Multi-party Computation in MapReduce
    Ferdaus, Syeda Israt
    Adnan, Muhammad Abdullah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 365 - 369
  • [27] On Concurrent Multi-party Quantum Computation
    Goyal, Vipul
    Liang, Xiao
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 129 - 161
  • [28] Graceful Degradation in Multi-Party Computation
    Hirt, Martin
    Lucas, Christoph
    Maurer, Ueli
    Raub, Dominik
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 163 - 180
  • [29] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [30] A study of secure multi-party ranking problem
    Liu, Wen
    Luo, Shou-Shan
    Chen, Ping
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 727 - +