File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Weighted average problem revisited under hybrid and malicious model

TitleWeighted average problem revisited under hybrid and malicious model
Authors
KeywordsSecure multi-party computation
Weighted average problem
Hybrid security model
Privacy preservation
Homomorphic encryption
Issue Date2012
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002957
Citation
The 8th International Conference on Computing Technology and Information Management (ICCM 2012), Seoul; South Korea, 24-26 April 2012. In Conference Proceedings, 2012, v. 2, p. 677-682 How to Cite?
AbstractIt is getting more common for two or more parties to jointly compute some statistics, say for marketing, by combining information on their private databases without disclosing the private data to the others. The core problem is usually known as secure multi-party computation (SMC). A number of solutions have been proposed. However, almost all of them assume a semi-honest model which is unrealistic. On the other hand, protocols that work under the malicious model (all participating parties can be malicious) are usually complicated and expensive in terms of communication and computation. In this paper, we try to consider a more reasonable model, the hybrid security model, in which at least one party is semi-honest. We want to make sure that the malicious parties will not get the correct final result if they perform malicious behaviors. We propose a scheme to solve the two-party weighted average problem (WAP) under this hybrid security model. We also show that the scheme can be extended to work under the malicious model using any fair exchange scheme. We formally show that our schemes are secure. We also implemented the schemes and showed that our scheme under the hybrid security model is reasonably fast and efficient for practical use. © 2012 AICIT.
Persistent Identifierhttp://hdl.handle.net/10722/192712
ISBN

 

DC FieldValueLanguage
dc.contributor.authorXiong, Hen_US
dc.contributor.authorZhang, EPen_US
dc.contributor.authorChim, TWen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHui, LCKen_US
dc.date.accessioned2013-11-20T04:57:09Z-
dc.date.available2013-11-20T04:57:09Z-
dc.date.issued2012en_US
dc.identifier.citationThe 8th International Conference on Computing Technology and Information Management (ICCM 2012), Seoul; South Korea, 24-26 April 2012. In Conference Proceedings, 2012, v. 2, p. 677-682en_US
dc.identifier.isbn978-898867867-1-
dc.identifier.urihttp://hdl.handle.net/10722/192712-
dc.description.abstractIt is getting more common for two or more parties to jointly compute some statistics, say for marketing, by combining information on their private databases without disclosing the private data to the others. The core problem is usually known as secure multi-party computation (SMC). A number of solutions have been proposed. However, almost all of them assume a semi-honest model which is unrealistic. On the other hand, protocols that work under the malicious model (all participating parties can be malicious) are usually complicated and expensive in terms of communication and computation. In this paper, we try to consider a more reasonable model, the hybrid security model, in which at least one party is semi-honest. We want to make sure that the malicious parties will not get the correct final result if they perform malicious behaviors. We propose a scheme to solve the two-party weighted average problem (WAP) under this hybrid security model. We also show that the scheme can be extended to work under the malicious model using any fair exchange scheme. We formally show that our schemes are secure. We also implemented the schemes and showed that our scheme under the hybrid security model is reasonably fast and efficient for practical use. © 2012 AICIT.en_US
dc.languageengen_US
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002957-
dc.relation.ispartofInternational joint Conference on INC, IMS and IDC, NCM Proceedingsen_US
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.subjectSecure multi-party computation-
dc.subjectWeighted average problem-
dc.subjectHybrid security model-
dc.subjectPrivacy preservation-
dc.subjectHomomorphic encryption-
dc.titleWeighted average problem revisited under hybrid and malicious modelen_US
dc.typeConference_Paperen_US
dc.description.naturepublished_or_final_versionen_US
dc.identifier.scopuseid_2-s2.0-84866985801en_US
dc.identifier.volume2en_US
dc.identifier.spage677en_US
dc.identifier.epage682en_US
dc.publisher.placeUnited States-
dc.customcontrol.immutablesml 131210-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats