Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [41] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [42] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [43] Post-Quantum Multi-Party Computation
    Agarwal, Amit
    Bartusek, James
    Goyal, Vipul
    Khurana, Dakshita
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 435 - 464
  • [44] Efficient multi-party computation with dispute control
    Beerliova-Trubiniova, Zuzana
    Hirt, Martin
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 305 - 328
  • [45] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [46] Multi-party computation with conversion of secret sharing
    Ghodosi, Hossein
    Pieprzyk, Josef
    Steinfeld, Ron
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (03) : 259 - 272
  • [47] General adversaries in unconditional multi-party computation
    Fitzi, M
    Hirt, M
    Maurer, U
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 232 - 246
  • [48] Multi-party Computation Based on Physical Coins
    Komano, Yuichi
    Mizuki, Takaaki
    THEORY AND PRACTICE OF NATURAL COMPUTING (TPNC 2018), 2018, 11324 : 87 - 98
  • [49] Publicly Accountable Robust Multi-Party Computation
    Rivinius, Marc
    Reisert, Pascal
    Rausch, Daniel
    Kuesters, Ralf
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2430 - 2449
  • [50] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386