期刊文献+

A Secure Scalar Product Protocol Against Malicious Adversaries 被引量:3

A Secure Scalar Product Protocol Against Malicious Adversaries
原文传递
导出
摘要 A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs. A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期152-158,共7页 计算机科学技术学报(英文版)
基金 This work was supported by the National Natural Science Foundation of China under Grant Nos. 60973134, 61173164, 61003232, and the Natural Science Foundation of Guangdong Province of China under Grant No. 10351806001000000.
关键词 secure multi-party computation secure scalar product protocol verifiable encryption secure multi-party computation, secure scalar product protocol, verifiable encryption
  • 相关文献

参考文献16

  • 1Tran D H, Ng W K, Lim H W et al. An efficient cacheable se- cure scalar product protocol for privacy-preserving data min- ing. In Pvoc. the 13th Int. Conf. Data Warehousing and Knowledge Discovery, Aug. 29-Sept. 2, 2011, pp.354-366.
  • 2Goethals B, Laur S, Lipmaa H, Mielikainen T. On private scalar product computation for privacy-preserving data min- ing. In Proc. the 7th Int. Conf. Information Security and Cryptology, Dec. 2004, pp.104-120.
  • 3Vaidya J, Clifton C. Privacy preserving association rule min- ing in vertically partitioned data. In Pr0c. the 8th SIGKDD Int. Conf. Knowledge Discovery and Data Mining, July 2002. OD.639-644.
  • 4Du W:-Atallah M. Privacy-preserving cooperative statistical analysis. In Proc. the 17th Annual Computer Security Ap- plications Conference, Dec. 2001, pp.102-110.
  • 5Atallah M J, Du W. Secure multiparty computational geom- etry. In Proc. the 7th fnternational Workshop on Algorithms and Data Structures, Aug. 2011, pp.165-179.
  • 6Thomas T. Secure Two-party protocols for point inclusion problem. Int. J. Network Security, 2009, 9(1): 1-7.
  • 7Yang B, Sun A D, Zhang W Z. Secure two-party protocols on planar circles. Journal of Information :z Computational Science, 2011, 8(1): 29-40.
  • 8Yang B, Shao Z Y, Zhang W Z. Secure two-party protocols on planar convex hulls. Journal of Information : Computa- tional Science, 2012, 9(4): 915-929.
  • 9Du W, Zhan Z. Building decision tree classifier on private data. In Proc. IEEE ICDM Workshop on Privacy, SecuT:ty, and Data Mining, Dec. 2002, Vol.14, pp.l-8.
  • 10Amirbekyan A, Estivill-Castro V E C. A new efficient privacy- preserving scalar product protocol. In Proc. the 6th Aus- tralasian Data Mining Conference, Dec. 2007, pp.209-214.

同被引文献17

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部