Journal of Computer Science and Technology
Quick Search in JCST
 Advanced Search 
      Home | PrePrint | SiteMap | Contact Us | FAQ
 
Indexed by   SCIE, EI ...
Bimonthly    Since 1986
Journal of Computer Science and Technology 2013, Vol. 28 Issue (1) :152-158    DOI: 10.1007/s11390-013-1319-3
Information Security Current Issue | Archive | Adv Search << Previous Articles | Next Articles >>
A Secure Scalar Product Protocol Against Malicious Adversaries
Bo Yang1 (杨波), Yong Yu2 (禹勇), and Chung-Huang Yang3 (杨中皇)
1. School of Computer Science, Shaanxi Normal University, Xi’an 710062, China;
2. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 610054, China;
3. Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan, China

Abstract
Reference
Related Articles
Download: [PDF 272KB]     Export: BibTeX or EndNote (RIS)  
Abstract A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
Articles by authors
Bo Yang
Yong Yu
Chung-Huang Yang
Keywordssecure multi-party computation   secure scalar product protocol   verifiable encryption     
Received 2011-10-11;
Fund:

This work was supported by the National Natural Science Foundation of China under Grant Nos. 60973134, 61173164, 61003232, and the Natural Science Foundation of Guangdong Province of China under Grant No. 10351806001000000.

Cite this article:   
Bo Yang, Yong Yu, and Chung-Huang Yang.A Secure Scalar Product Protocol Against Malicious Adversaries[J]  Journal of Computer Science and Technology, 2013,V28(1): 152-158
URL:  
http://jcst.ict.ac.cn:8080/jcst/EN/10.1007/s11390-013-1319-3
Copyright 2010 by Journal of Computer Science and Technology