Toward Empirical Aspects of Secure Scalar Product

There is a fair amount of research about privacy, but few empirical studies about its cost have been conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising alternatives to classic logic gates. The reason for this is that the scalar product is not only complete, which is as good as logic gates, but also much more efficient than logic gates. As a result, we set out to study the computation and communication resources needed for some of the most well-known and frequently referenced secure scalar product protocols, including the composite residuosity, the invertible matrix, the polynomial sharing, and the commodity-based approaches. In addition to the implementation details of these approaches, we analyze and compare their execution time, computation time, and memory and random number consumption. Moreover, Fairplay, the benchmark approach that implements Yao's circuit evaluation protocol, is also included in our experiments in order to demonstrate the potential for the scalar products to replace logic gates.

[1]  L. Turner,et al.  Inverse of the Vandermonde matrix with applications , 1966 .

[2]  Yi-Ting Chiang,et al.  Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.

[3]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[4]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[5]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[6]  Joe Kilian,et al.  Founding crytpography on oblivious transfer , 1988, STOC '88.

[7]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.

[8]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[9]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[10]  Rafail Ostrovsky,et al.  Secure two-party k-means clustering , 2007, CCS '07.

[11]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[12]  Yi-Ting Chiang,et al.  Secrecy of Two-Party Secure Computation , 2005, DBSec.

[13]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[14]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[15]  Donald Beaver,et al.  Commodity-based cryptography (extended abstract) , 1997, STOC '97.

[16]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[17]  Joe Kilian,et al.  A general completeness theorem for two party games , 1991, STOC '91.

[18]  Da-Wei Wang,et al.  Information-Theoretically Secure Number-Product Protocol , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[19]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[20]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[21]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[22]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.