篇名 |
Confidentially Compare Rational Numbers under the Malicious Model
|
---|---|
並列篇名 | Confidentially Compare Rational Numbers under the Malicious Model |
作者 | Xin Liu、Xiaomeng Liu、Dan Luo、Gang Xu、Xiu-Bo Chen |
英文摘要 | Secure multi-party computation is a hotspot in the cryptography field, and it is also a significant means to realize privacy computation. The Millionaires’ problem is the most fundamental problem among them, which is the basic module of secure multi-party computation protocols. Although there are many solutions to this problem, there are few anti-malicious adversarial protocols besides protocols based on Yao’s garbled circuit. Only a few solutions have low efficiency, and there is no protocol for rational numbers comparison under the malicious model, which restricts the solution of many secure multi-party computation problems. In this paper, the possible malicious behaviors are analyzed in the existing Millionaires’ problem protocols. These behaviors are discovered and taken precautions against through the triangle area formula, zero-knowledge proof, and cut-and-choose method, so the protocol of comparing confidentially rational numbers is proposed under the malicious model. And this paper adopts the real/ideal model paradigm to prove the security of the malicious model protocol. Efficiency analysis indicates that the proposed protocol is more effective than existing protocols. The protocol of rational numbers comparison under the malicious model is more suitable for the practical applications of secure multi-party computation, which has important theoretical and practical significance.
|
起訖頁 | 355-363 |
關鍵詞 | Secure multi-party computation、Malicious model、Rational numbers comparison、Real/ideal model paradigm |
刊名 | 網際網路技術學刊 |
期數 | 202405 (25:3期) |
出版單位 | 台灣學術網路管理委員會 |
DOI |
|
QR Code | |
該期刊 上一篇
| GBRUN: A Gradient Search-based Binary Runge Kutta Optimizer for Feature Selection |
該期刊 下一篇
| Data Hiding Methods Using Voting Strategy and Mapping Table |