File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Weighted average problem revisited under hybrid and malicious model
Title | Weighted average problem revisited under hybrid and malicious model |
---|---|
Authors | |
Keywords | Secure multi-party computation Weighted average problem Hybrid security model Privacy preservation Homomorphic encryption |
Issue Date | 2012 |
Publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002957 |
Citation | The 8th International Conference on Computing Technology and Information Management (ICCM 2012), Seoul; South Korea, 24-26 April 2012. In Conference Proceedings, 2012, v. 2, p. 677-682 How to Cite? |
Abstract | It is getting more common for two or more parties to jointly compute some statistics, say for marketing, by combining information on their private databases without disclosing the private data to the others. The core problem is usually known as secure multi-party computation (SMC). A number of solutions have been proposed. However, almost all of them assume a semi-honest model which is unrealistic. On the other hand, protocols that work under the malicious model (all participating parties can be malicious) are usually complicated and expensive in terms of communication and computation. In this paper, we try to consider a more reasonable model, the hybrid security model, in which at least one party is semi-honest. We want to make sure that the malicious parties will not get the correct final result if they perform malicious behaviors. We propose a scheme to solve the two-party weighted average problem (WAP) under this hybrid security model. We also show that the scheme can be extended to work under the malicious model using any fair exchange scheme. We formally show that our schemes are secure. We also implemented the schemes and showed that our scheme under the hybrid security model is reasonably fast and efficient for practical use. © 2012 AICIT. |
Persistent Identifier | http://hdl.handle.net/10722/192712 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xiong, H | en_US |
dc.contributor.author | Zhang, EP | en_US |
dc.contributor.author | Chim, TW | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.date.accessioned | 2013-11-20T04:57:09Z | - |
dc.date.available | 2013-11-20T04:57:09Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.citation | The 8th International Conference on Computing Technology and Information Management (ICCM 2012), Seoul; South Korea, 24-26 April 2012. In Conference Proceedings, 2012, v. 2, p. 677-682 | en_US |
dc.identifier.isbn | 978-898867867-1 | - |
dc.identifier.uri | http://hdl.handle.net/10722/192712 | - |
dc.description.abstract | It is getting more common for two or more parties to jointly compute some statistics, say for marketing, by combining information on their private databases without disclosing the private data to the others. The core problem is usually known as secure multi-party computation (SMC). A number of solutions have been proposed. However, almost all of them assume a semi-honest model which is unrealistic. On the other hand, protocols that work under the malicious model (all participating parties can be malicious) are usually complicated and expensive in terms of communication and computation. In this paper, we try to consider a more reasonable model, the hybrid security model, in which at least one party is semi-honest. We want to make sure that the malicious parties will not get the correct final result if they perform malicious behaviors. We propose a scheme to solve the two-party weighted average problem (WAP) under this hybrid security model. We also show that the scheme can be extended to work under the malicious model using any fair exchange scheme. We formally show that our schemes are secure. We also implemented the schemes and showed that our scheme under the hybrid security model is reasonably fast and efficient for practical use. © 2012 AICIT. | en_US |
dc.language | eng | en_US |
dc.publisher | IEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002957 | - |
dc.relation.ispartof | International joint Conference on INC, IMS and IDC, NCM Proceedings | en_US |
dc.subject | Secure multi-party computation | - |
dc.subject | Weighted average problem | - |
dc.subject | Hybrid security model | - |
dc.subject | Privacy preservation | - |
dc.subject | Homomorphic encryption | - |
dc.title | Weighted average problem revisited under hybrid and malicious model | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.scopus | eid_2-s2.0-84866985801 | en_US |
dc.identifier.volume | 2 | en_US |
dc.identifier.spage | 677 | en_US |
dc.identifier.epage | 682 | en_US |
dc.publisher.place | United States | - |
dc.customcontrol.immutable | sml 131210 | - |