2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6566844
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable private multi-party computation: Ranging and ranking

Abstract: Abstract-The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work, we focus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
3

Relationship

3
6

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…e.g. [39]- [43]. We need to design a truthful mechanism when the initiator wants to find a target expert within certain hop distance, while tolerating the possibility of multiple experts were found by multiple social referral paths.…”
Section: Discussionmentioning
confidence: 99%
“…e.g. [39]- [43]. We need to design a truthful mechanism when the initiator wants to find a target expert within certain hop distance, while tolerating the possibility of multiple experts were found by multiple social referral paths.…”
Section: Discussionmentioning
confidence: 99%
“…In contrast, our model has the following characteristics: the inputs to the delegated functions include other data owners' private data sets, which are not known to the delegators in advance. Finally, [38] considered the notion of verifiable private multi-party computation, but not in the setting of outsourcing data and functions to the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…That is, the DDH problem is easier than the CDH one, and if a problem is as hard as a DDH problem, it is harder than a CDH problem. Our protocol is based on the assumption that it is computational expensive to solve the CDH problem as in other similar research works ( [22], [23], [24], [25], [26], [27]). Then, we define the security of our privacy-preserving sum and product calculation as follows.…”
Section: Security Modelmentioning
confidence: 99%