Verifiable Private Multi-party Computation: Ranging and Ranking

被引:0
|
作者
Zhang, Lan [1 ]
Li, Xiang-Yang [1 ]
Liu, Yunhao [1 ]
Jung, Taeho [1 ]
机构
[1] Tsinghua Univ, TNList, Dept Comp Sci & Technol, Beijing, Peoples R China
来源
2013 PROCEEDINGS IEEE INFOCOM | 2013年
关键词
Verifiability; Privacy; Multi-party Computation; Ranking; Ranging; Dot Product;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
引用
收藏
页码:605 / 609
页数:5
相关论文
共 50 条
  • [21] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [22] Multi-Party Private Function Evaluation for RAM
    Ji, Keyu
    Zhang, Bingsheng
    Lu, Tianpei
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1252 - 1267
  • [23] Verifiable Multi-Party Universal Blind Quantum Computing in Distributed Networks
    SHAN, Ruiting
    CHEN, Xiubo
    XU, Gang
    DOU, Zhao
    Li, Zongpeng
    MIAO, Lihua
    YANG, Yixian
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 712 - 718
  • [24] Verifiable Multi-Party Universal Blind Quantum Computing in Distributed Networks
    SHAN Ruiting
    CHEN Xiubo
    XU Gang
    DOU Zhao
    LI Zongpeng
    MIAO Lihua
    YANG Yixian
    ChineseJournalofElectronics, 2021, 30 (04) : 712 - 718
  • [25] Blockchain-assisted Verifiable Secure Multi-Party Data Computing
    Pei, Hongmei
    Yang, Peng
    Du, Miao
    Liang, Zengyu
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 253
  • [26] Batch Logical Protocols for Efficient Multi-Party Computation
    Kiribuchi, Naoto
    Kato, Ryo
    Endo, Tsukasa
    Nishide, Takashi
    Yoshiura, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1718 - 1728
  • [27] Application of Randomness for Security and Privacy in Multi-Party Computation
    Saha, Rahul
    Kumar, Gulshan
    Geetha, G.
    Conti, Mauro
    Buchanan, William J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5694 - 5705
  • [28] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    Journal of Cryptology, 2005, 18 : 37 - 61
  • [29] TinyKeys: A New Approach to Efficient Multi-Party Computation
    Hazay, Carmit
    Orsini, Emmanuela
    Scholl, Peter
    Soria-Vazquez, Eduardo
    JOURNAL OF CRYPTOLOGY, 2022, 35 (02)
  • [30] Minimal complete primitives for secure multi-party computation
    Fitzi, M
    Garay, JA
    Maurer, U
    Ostrovsky, R
    JOURNAL OF CRYPTOLOGY, 2005, 18 (01) : 37 - 61