Secure linear system computation in the presence of malicious adversaries

被引:0
|
作者
Bo Zhang
FangGuo Zhang
机构
[1] Sun Yat-sen University,School of Information Science and Technology
来源
关键词
linear system computation; noisy coding; oblivious transfer; cut-and-choose; secure two-party computation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the system of linear equation problems in the two-party computation setting. Consider that P1 holds an m × m matrix M1 and an m-dimensional column vector B1. Similarly, P2 holds M2 and B2. Via executing a secure linear system computation, P1 gets the output x (or ⊥) conditioned on (M1 + M2)x = (B1 + B2), and the rank of matrix M1 + M2, while P2 gets nothing. This also can be used to settle other cooperative linear system problems. We firstly design an efficient protocol to solve this problem in the presence of malicious adversaries, then propose a simple way to modify our protocol for having a precise functionality, in which the rank of matrix M1+M2 is not necessary. We note that our protocol is more practical than these existing malicious secure protocols. We also give comparisons with other protocols and extensions to similar functions.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 50 条
  • [21] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [22] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [23] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158
  • [24] Efficient Set Operations in the Presence of Malicious Adversaries
    Carmit Hazay
    Kobbi Nissim
    Journal of Cryptology, 2012, 25 : 383 - 433
  • [25] Efficient Set Operations in the Presence of Malicious Adversaries
    Hazay, Carmit
    Nissim, Kobbi
    JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 383 - 433
  • [26] Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries
    Mohassel, Payman
    Weinreb, Enav
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 481 - +
  • [27] Securing mobile auctions in the presence of malicious adversaries
    Zhu, Huafei
    Qiu, Ying
    Bao, Feng
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 433 - 437
  • [28] Efficient Set Operations in the Presence of Malicious Adversaries
    Hazay, Carmit
    Nissim, Kobbi
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 312 - +
  • [29] Secure Hamming distance based record linkage with malicious adversaries
    Zhang, Bo
    Cheng, Rong
    Zhang, Fangguo
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1906 - 1916
  • [30] Secure blockchain bidding auction protocol against malicious adversaries
    Dai, Xiaobing
    Liu, Jiajing
    Liu, Xin
    Tu, Xiaofen
    Wang, Ruexue
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):