Scalar-product based secure two-party computation

Secure multiparty computation is a very important research topic in cryptography. The sub-problem of secure multiparty computation that has received special attention by researchers because of its close relation to many cryptographic tasks is secure two-party computation. This area of research is concerned with the question: ldquoCan two party computation be achieved more efficiently and under weaker security assumptions than general multiparty computation?rdquo Yaopsilas protocol provided security against passive adversaries, while Lindell and Pinkas proposed secure two party protocols that are secure against active adversaries. In this paper, we would like to propose a set of information theoretically secure protocols based on scalar product protocol. The detailed complexity analysis is also provided.

[1]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[2]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Donald Beaver,et al.  Commodity-based cryptography (extended abstract) , 1997, STOC '97.

[5]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[6]  Rafail Ostrovsky,et al.  Secure two-party k-means clustering , 2007, CCS '07.

[7]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[8]  Joe Kilian,et al.  Founding crytpography on oblivious transfer , 1988, STOC '88.

[9]  Yi-Ting Chiang,et al.  Secrecy of Two-Party Secure Computation , 2005, DBSec.

[10]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[11]  Yi-Ting Chiang,et al.  Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.

[12]  Joe Kilian,et al.  A general completeness theorem for two party games , 1991, STOC '91.

[13]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[14]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[15]  Da-Wei Wang,et al.  Information-Theoretically Secure Number-Product Protocol , 2007, 2007 International Conference on Machine Learning and Cybernetics.