A Secure Scalar Product Protocol Against Malicious Adversaries

被引:4
作者
杨波 [1 ]
禹勇 [2 ]
杨中皇 [3 ]
机构
[1] School of Computer Science,Shaanxi Normal University
[2] School of Computer Science and Engineering,University of Electronic Science and Technology of China
[3] Graduate Institute of Information and Computer Education,National Kaohsiung Normal University
基金
中国国家自然科学基金;
关键词
secure multi-party computation; secure scalar product protocol; verifiable encryption;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A secure scalar product protocol is a type of specific secure multi-party computation problem.Using this kind of protocol,two involved parties are able to jointly compute the scalar product of their private vectors,but no party will reveal any information about his/her private vector to another one.The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining,privacy-preserving cooperative statistical analysis,and privacy-preserving geometry computation.In this paper,we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools:the proof of knowledge of a discrete logarithm and the verifiable encryption.The security of the new protocol is proved under the standard simulation-based definitions.Compared with the existing schemes,our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
引用
收藏
页码:152 / 158
页数:7
相关论文
共 1 条
  • [1] Efficient signature generation by smart cards[J] . C. P. Schnorr.Journal of Cryptology . 1991 (3)