Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.2.13

A Practical Privacy-Preserving Multi-Party Computation Protocol for Solving Linear Systems  

Yi Ok-Yeon (Department of Mathematics, Kookmin University)
Hong Do-Won (Information Security Research Division. ETRI)
Kang Ju-Sung (Department of Mathematics, Kookmin University)
Abstract
We consider a privacy-preserving cooperative computation protocol evaluating a beneficial function of all participants' secret inputs, such that each party finally holds a share of the function output. We propose a practical privacy-preserving cooperative computation protocol for solving the linear system of equations problem md the linear least-squares problem. Solutions to these problems are widely used in many areas such as banking, manufacturing, and telecommunications. Our multi-party protocol is an efficiently extended version of the previous two-party model.
Keywords
Secure multi-party computation; Linear system; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 O. Goldreich, 'Secure Multi-Party Computation (Final Draft, Version 1.4)', http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 2002
2 M. Atallah, M. Bykova, J. Li, K. Frikken, M. Topkara, 'Private collaborative forecasting and benchmarking', WEPS2004, 2004
3 W. Du, M. Atallah, 'Secure multiparty computation problems and their applications: A review and open problems', Proceedings of New Security Paradigms Workshop, pp. 11-20, 2001
4 L. Kissner, D. Song, 'Privacy-Preserving Set Operation', Advances in Cryptology - CRYPTO 2005, LNCS 3621, Springer-Verlag, pp. 241-257, 2005
5 M. Freedman, K. Nissim, B. Pinkas, 'Efficient private matching and set intersection', Advances in Cryptology-Eurocrypt 2004, LNCS 3027, Springer- Verlag, pp. 1-19, 2004
6 M. Naor, B. Pinkas, 'Oblivious transfer and polynomial evaluation', Proceedings of the 31th ACMSTC, pp. 245-254, 1999
7 W. Du, M.Atallah, 'Privacy-preserving cooperative scientific computations', 14th IEEE Computer Security Foundations Workshop, pp. 273-282, 2001
8 O. Goldreich, S. Micali, A. Wigderson, 'How to play any mental game', Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218- 229, 1987
9 Y. Lindell, B. Pinkas, 'Privacy preserving data mining', CRYPTO 2000, LNCS 1880, 2000
10 W. Du, M. Atallah, 'Protocols for secure remote database access with approximate matching', ACMCCS2000, 2000
11 H. Anton, R. C. Busby, Contemporary Linear Algebra, John Wiley & Sons, 2003
12 A.C. Yao, 'Protocols for secure computations', Proceedings of the 23th Annual IEEE Symposium on Foundations of Computer Science, 1982
13 R. Cramer, I. Damgard, 'Secure distributed linear algebra in a constant number of rounds', CRYPTO 2001, LNCS 2139, pp. 119-136, 2001