Secure linear system computation in the presence of malicious adversaries

被引:0
|
作者
Bo Zhang
FangGuo Zhang
机构
[1] Sun Yat-sen University,School of Information Science and Technology
来源
关键词
linear system computation; noisy coding; oblivious transfer; cut-and-choose; secure two-party computation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the system of linear equation problems in the two-party computation setting. Consider that P1 holds an m × m matrix M1 and an m-dimensional column vector B1. Similarly, P2 holds M2 and B2. Via executing a secure linear system computation, P1 gets the output x (or ⊥) conditioned on (M1 + M2)x = (B1 + B2), and the rank of matrix M1 + M2, while P2 gets nothing. This also can be used to settle other cooperative linear system problems. We firstly design an efficient protocol to solve this problem in the presence of malicious adversaries, then propose a simple way to modify our protocol for having a precise functionality, in which the rank of matrix M1+M2 is not necessary. We note that our protocol is more practical than these existing malicious secure protocols. We also give comparisons with other protocols and extensions to similar functions.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 50 条
  • [1] Secure linear system computation in the presence of malicious adversaries
    ZHANG Bo
    ZHANG FangGuo
    Science China(Information Sciences), 2014, 57 (09) : 146 - 155
  • [2] Secure linear system computation in the presence of malicious adversaries
    Zhang Bo
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 10
  • [3] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [4] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [5] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    Journal of Cryptology, 2015, 28 : 312 - 350
  • [6] Secure Biometric Verification in the Presence of Malicious Adversaries
    Al-Mannai, Kamela
    Bentafat, Elmahdi
    Bakiras, Spiridon
    Schneider, Jens
    IEEE ACCESS, 2025, 13 : 5284 - 5295
  • [7] Secure keyword search in the presence of malicious adversaries
    Pang, Xiaoqiong
    Yang, Bo
    Liu, Jie
    Journal of Computational Information Systems, 2012, 8 (22): : 9581 - 9591
  • [8] Two-Output Secure Computation with Malicious Adversaries
    Shelat, Abhi
    Shen, Chih-Hao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405
  • [9] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries
    Mouffron, Marc
    Rousseau, Frederic
    Zhu, Huafei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
  • [10] Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
    Hazay, Carmit
    Toft, Tomas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 195 - 212