• DocumentCode
    3372333
  • Title

    Towards Empirical Aspects of Secure Scalar Product

  • Author

    Wang, Cheng ; Shen, Chih-Hao ; Hsu, Tsan-Sheng ; Liao, Churn-Chung ; Wang, Da-Wei ; Zhan, Justin

  • Author_Institution
    Inst. of Inf. Sci., Acad. Sinica, Taipei
  • fYear
    2008
  • fDate
    24-26 April 2008
  • Firstpage
    573
  • Lastpage
    578
  • Abstract
    Privacy is ultimately important, and there is a fair amount of research about it. However, few empirical studies about the cost of privacy are conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising building blocks in place of the classic logic gates. The reason is not only the scalar product complete, which is as good as logic gates, but also the scalar product is much more efficient than logic gates. As a result, we set to study the computation and communication resources needed for some of the most well-known and frequently referred secure scalar-product protocols, including the composite-residuosity, the invertible-matrix, the polynomial-sharing, and the commodity-based approaches. Besides the implementation remarks of these approaches, we analyze and compare their execution time, computation time, and random number consumption, which are the most concerned resources when talking about secure protocols. Moreover, Fairplay the benchmark approach implementing Yao´s famous circuit evaluation protocol, is included in our experiments in order to demonstrate the potential for the scalar product to replace logic gates.
  • Keywords
    data privacy; protocols; circuit evaluation protocol; composite-residuosity; invertible-matrix; logic gates; polynomial-sharing; privacy; secure multiparty computation; secure protocols; secure scalar product; secure scalar-product protocols; Circuits; Computational efficiency; Costs; Information science; Information security; Logic gates; Polynomials; Privacy; Proposals; Protocols; commodity-based; composite residuosity; empirical survey; scalar-product; secure multiparty computation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Assurance, 2008. ISA 2008. International Conference on
  • Conference_Location
    Busan
  • Print_ISBN
    978-0-7695-3126-7
  • Type

    conf

  • DOI
    10.1109/ISA.2008.78
  • Filename
    4511630