Browse > Article
http://dx.doi.org/10.3745/JIPS.2007.3.1.021

A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations  

Kang, Ju-Sung (Dept. of Mathematics, Kookmin University)
Hong, Do-Won (Information Security Research Division, ETRI)
Publication Information
Journal of Information Processing Systems / v.3, no.1, 2007 , pp. 21-25 More about this Journal
Abstract
We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equations: the linear systems of equations problem and the linear least-square problem. The protocols proposed in this paper achieve acceptable security in the sense of Du-Zhan's paradigm and t-wise collusion-resistance, and their communication complexity is O(tm), where t is a security parameter and m is the total number of participants. The complexity of our protocol is significantly better than the previous result O($m^2/{\mu}$) of [4], in which the oblivious transfer protocol is used as an important building block.
Keywords
SMC; Practical SMC; Privacy; Linear system of equations;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. C. Yao, 'Protocols for secure computations', At the 23rd Annual Symposium on the Foundations of Computer Science, IEEE, 1982   DOI
2 Y. Lindell, B. Pinkas, 'Privacy preserving data mining', Advances in Cryptology - Crypt02000, LNCS 1592, pp. 402-414,1999
3 O. Goldreich, 'Secure Multi-party Computation', Final Draft, Version 1.4, 2002
4 W. Du, M. J. Atallah, 'Secure multi-party computation problems and their applications: A review and open problems', In the Proceedings of the New Security Paradigms Workshop, pp. 11-20, 2001   DOI
5 M. J. Atallah, W. Du, 'Secure multi-party computational geometry', In WADS2001: 7th International Workshop on Algorithms and Data Structures, pp. 165-179,2001   DOI   ScienceOn
6 M. Atallah, M. Bykova, J. Li, K. Frikken, M. Topkara, 'Private collaborative forecasting and benchmarking', WEPS2004, 2004   DOI
7 O. Goldreich, S. Micali, A. Wigderson, 'How to play any mental game', In the Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pp. 218-229,1987   DOI
8 W. Du, M. J. Atallah, 'Privacy-preserving Cooperative Scientific Computations', In the 14th IEEE Computer Security Foundations Workshop, pp. 273-282,2001
9 W. Du, M. J. Atallah, 'Protocols for secure remote database access with approximate matching', In the 7th ACM Conference on Computer and Communications Security, 2000
10 W. Du, M. J. Atallah, 'Privacy-preserving statistical analysis', In the Proceedings of the 17th Annual Computer Security Applications Conference, pp. 102-110,2001
11 W. Du, Z. Zhan, 'A practical approach to solving secure multi-party computation problems', In New Security Paradigms Workshop 2002, pp. 127-135, 2002   DOI
12 M. Naor, B. Pinkas, 'Oblivious transfer and polynomial evaluation', In the Proceedings of the 31st ACM Symposium on the Theory of Computing, pp. 245-254, 1999   DOI