Secure linear system computation in the presence of malicious adversaries

被引:0
|
作者
Bo Zhang
FangGuo Zhang
机构
[1] Sun Yat-sen University,School of Information Science and Technology
来源
关键词
linear system computation; noisy coding; oblivious transfer; cut-and-choose; secure two-party computation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the system of linear equation problems in the two-party computation setting. Consider that P1 holds an m × m matrix M1 and an m-dimensional column vector B1. Similarly, P2 holds M2 and B2. Via executing a secure linear system computation, P1 gets the output x (or ⊥) conditioned on (M1 + M2)x = (B1 + B2), and the rank of matrix M1 + M2, while P2 gets nothing. This also can be used to settle other cooperative linear system problems. We firstly design an efficient protocol to solve this problem in the presence of malicious adversaries, then propose a simple way to modify our protocol for having a precise functionality, in which the rank of matrix M1+M2 is not necessary. We note that our protocol is more practical than these existing malicious secure protocols. We also give comparisons with other protocols and extensions to similar functions.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 50 条
  • [31] The secure judgment of graphic similarity against malicious adversaries and its applications
    Xin Liu
    Yang Xu
    Dan Luo
    Gang Xu
    Neal Xiong
    Xiu-Bo Chen
    Scientific Reports, 13 (1)
  • [32] The secure judgment of graphic similarity against malicious adversaries and its applications
    Liu, Xin
    Xu, Yang
    Luo, Dan
    Xu, Gang
    Xiong, Neal
    Chen, Xiu-Bo
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [33] Asynchronous perfectly secure computation tolerating generalized adversaries
    Kumar, MVNA
    Srinathan, K
    Rangan, CP
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 497 - 511
  • [34] Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries
    Debnath, Sumit Kumar
    Dutta, Ratna
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 326 - 339
  • [35] Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries
    Mitra, Aritra
    Sundaram, Shreyas
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 2709 - 2714
  • [36] Secure Maximum (Minimum) Computation in Malicious Model
    Li S.-D.
    Xu W.-T.
    Wang W.-L.
    Zhang M.-Y.
    1600, Science Press (44): : 2076 - 2089
  • [37] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dachman-Soled, Dana
    Fleischhacker, Nils
    Katz, Jonathan
    Lysyanskaya, Anna
    Schroeder, Dominique
    JOURNAL OF CRYPTOLOGY, 2020, 33 (02) : 595 - 617
  • [38] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dachman-Soled, Dana
    Fleischhacker, Nils
    Katz, Jonathan
    Lysyanskaya, Anna
    Schroeder, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 405 - 420
  • [39] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dana Dachman-Soled
    Nils Fleischhacker
    Jonathan Katz
    Anna Lysyanskaya
    Dominique Schröder
    Journal of Cryptology, 2020, 33 : 595 - 617
  • [40] Malicious adversaries against secure state estimation: Sparse sensor attack design
    Lu, An-Yang
    Yang, Guang-Hong
    AUTOMATICA, 2022, 136