We use cookies to improve your experience with our site.
杨波, 禹勇, 杨中皇. 恶意敌手模型下的安全点乘协议[J]. 计算机科学技术学报, 2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3
引用本文: 杨波, 禹勇, 杨中皇. 恶意敌手模型下的安全点乘协议[J]. 计算机科学技术学报, 2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3
Bo Yang, Yong Yu, Chung-Huang Yang. A Secure Scalar Product Protocol Against Malicious Adversaries[J]. Journal of Computer Science and Technology, 2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3
Citation: Bo Yang, Yong Yu, Chung-Huang Yang. A Secure Scalar Product Protocol Against Malicious Adversaries[J]. Journal of Computer Science and Technology, 2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3

恶意敌手模型下的安全点乘协议

A Secure Scalar Product Protocol Against Malicious Adversaries

  • 摘要: 安全的点乘协议是一类特定的安全多方计算问题,其目的是参加计算的两个用户,根据各自掌握的秘密向量,联合起来计算向量的点乘,但都不将自己的秘密信息暴露给对方.安全的点乘协议已在保留隐私的数据挖掘、保留隐私的协同统计分析、保留隐私的几何计算中得到广泛应用.本文给出了在恶意敌手模型下的一个有效的安全点乘协议,协议基于两个基本工具,一是离散对数的知识证明,二是可验证的加密.由于避免使用了效率极低的分割-选择法,我们的方案比现有的方案有更高的效率.

     

    Abstract: A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.

     

/

返回文章
返回