首页 | 本学科首页   官方微博 | 高级检索  
     


A Secure Scalar Product Protocol Against Malicious Adversaries
Authors:Bo Yang    Yong Yu    Chung-Huang Yang
Affiliation:1. School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
2. School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 610054, China
3. Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan, China
Abstract:A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.
Keywords:secure multi-party computation  secure scalar product protocol  verifiable encryption
本文献已被 CNKI 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号