Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
来源
2013 PROCEEDINGS IEEE INFOCOM | 2013年
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [1] Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
    Faust, Sebastian
    Hazay, Carmit
    Kretzler, David
    Schlosser, Benjamin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 782 - 811
  • [2] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
  • [3] Graceful Degradation in Multi-Party Computation
    Hirt, Martin
    Lucas, Christoph
    Maurer, Ueli
    Raub, Dominik
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 163 - 180
  • [4] Everlasting Multi-party Computation
    Dominique Unruh
    Journal of Cryptology, 2018, 31 : 965 - 1011
  • [5] Everlasting Multi-party Computation
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011
  • [6] A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation
    Bernabe-Rodriguez, Julen
    Garreta, Albert
    Lage, Oscar
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [7] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [8] Multi-Party Computation with Omnipresent Adversary
    Ghodosi, Hossein
    Pieprzyk, Josef
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 180 - +
  • [9] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    IEEE ACCESS, 2024, 12 : 53881 - 53899
  • [10] Efficient Coded Multi-Party Computation at Edge Networks
    Vedadi, Elahe
    Keshtkarjahromi, Yasaman
    Seferoglu, Hulya
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 807 - 820