Secure linear system computation in the presence of malicious adversaries

被引:0
|
作者
Bo Zhang
FangGuo Zhang
机构
[1] Sun Yat-sen University,School of Information Science and Technology
来源
关键词
linear system computation; noisy coding; oblivious transfer; cut-and-choose; secure two-party computation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the system of linear equation problems in the two-party computation setting. Consider that P1 holds an m × m matrix M1 and an m-dimensional column vector B1. Similarly, P2 holds M2 and B2. Via executing a secure linear system computation, P1 gets the output x (or ⊥) conditioned on (M1 + M2)x = (B1 + B2), and the rank of matrix M1 + M2, while P2 gets nothing. This also can be used to settle other cooperative linear system problems. We firstly design an efficient protocol to solve this problem in the presence of malicious adversaries, then propose a simple way to modify our protocol for having a precise functionality, in which the rank of matrix M1+M2 is not necessary. We note that our protocol is more practical than these existing malicious secure protocols. We also give comparisons with other protocols and extensions to similar functions.
引用
收藏
页码:1 / 10
页数:9
相关论文
共 50 条
  • [41] Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications
    Liu, Xin
    Xu, Yang
    Xu, Gang
    Chen, Xiu-Bo
    Chen, Yu -Ling
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (05): : 1019 - 1027
  • [42] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [43] Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    Smart, Nigel P.
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 2 - +
  • [44] Secure computation of common data among malicious partners
    Obermeier, Sebastian
    Boettcher, Stefan
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 345 - 354
  • [45] Secure anonymous union computation among malicious partners
    Boettcher, Stefan
    Obermeier, Sebastian
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 128 - +
  • [46] Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    Lai, Junfeng
    INFORMATION SCIENCES, 2018, 451 : 67 - 82
  • [47] A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries
    Zhu, Cui
    Wang, Zile
    Zang, Zeyuan
    Li, Yuxuan
    Zheng, Huanming
    JOURNAL OF SENSORS, 2022, 2022
  • [48] Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (01) : 644 - 682
  • [49] Enhancing benign user cooperation in the presence of malicious adversaries in ad hoc networks
    Theodorakopoulos, George
    Baras, John S.
    2006 SECURECOMM AND WORKSHOPS, 2006, : 279 - +
  • [50] Secure computation protocol of Chebyshev distance under the malicious model
    Liu, Xin
    Chen, Weitong
    Peng, Lu
    Luo, Dan
    Jia, Likai
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    SCIENTIFIC REPORTS, 2024, 14 (01):