Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [31] Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
    Mouris, Dimitris
    Tsoutsos, Nektarios Georgios
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2025, 25 (01)
  • [32] Private-preserving language model inference based on secure multi-party computation
    Song, Chen
    Huang, Ruwei
    Hu, Sai
    NEUROCOMPUTING, 2024, 592
  • [33] Verifiable Multi-party Quantum Key Agreement with Cluster State
    Lu D.-J.
    Li Z.-H.
    Yan C.-H.
    Liu L.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (12): : 4804 - 4815
  • [34] On the Power of Hybrid Networks in Multi-Party Computation
    Patra, Arpita
    Ravi, Divya
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4207 - 4227
  • [35] Recent Results in Scalable Multi-Party Computation
    Saia, Jared
    Zamani, Mahdi
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 24 - 44
  • [36] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [37] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [38] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [39] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [40] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287