Title :
Verifiable private multi-party computation: Ranging and ranking
Author :
Lan Zhang ; Xiang-Yang Li ; Yunhao Liu ; Taeho Jung
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
Abstract :
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus on the problem of verifiable privacy preserving multiparty computation. We thoroughly analyze the attacks on existing privacy preserving multi-party computation approaches and design a series of protocols for dot product, ranging and ranking, which are proved to be privacy preserving and verifiable. We implement our protocols on laptops and mobile phones. The results show that our verifiable private computation protocols are efficient both in computation and communication.
Keywords :
computer network security; cryptographic protocols; data privacy; mobile handsets; distributed secure multiparty computation; dot product protocol; malicious adversary; privacy preserving multiparty computation; privacy protection; ranging protocol; ranking protocol; verifiable private computation protocol; verifiable private multiparty computation; Distance measurement; Encryption; Portable computers; Privacy; Protocols; Vectors; Dot Product; Multi-party Computation; Privacy; Ranging; Ranking; Verifiability;
Conference_Titel :
INFOCOM, 2013 Proceedings IEEE
Conference_Location :
Turin
Print_ISBN :
978-1-4673-5944-3
DOI :
10.1109/INFCOM.2013.6566844