An efficient secure sum of multi-scalar products protocol base on elliptic curve

Authors

  • Vu Thi Van
  • Luong The Dung
  • Hoang Van Quan
  • Tran Thi Luong

DOI:

https://doi.org/10.54654/isj.v14i2.196

Keywords:

Scalar Product Protocol, Secure Multi-party Computation, Secure Sum Protocol, Elliptic curve cryptosystem, Privacy preserving data mining, Privacy preserving frequency mining

Tóm tắt

The secure scalar product protocol is widely applied to solve practical problems such as privacy-preserving data mining, secure auction, secure electronic voting, privacy-preserving recommendation system, privacy-preserving statistical data analysis, etc.. In this paper, we propose an efficient multi-party secure computation protocol using Elliptic curve cryptography, which allows to compute the sum value of multi-scalar products without revealing about the input vectors. Moreover, theoretical and experimental analysis shows that the proposed method is more efficient than others in both computation and communication.

References

David Evans, Vladimir Kolesnikov and Mike Rosulek, A Pragmatic Introduction to Secure Multi-Party Computation, NOW Publishers, 2018.

O. Goldreich., The Foundations of Cryptography, volume 2, Cambridge University Press, 2004.

Dong, Changyu and Chen, Liqun, "A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining," in Pacific-Asia Conference on Knowledge Discovery and Data Mining, 2014.

Y. Zhu,T. Takagi, "Efficient scalar product protocol and its privacypreserving application," in International J. of Electronic Security and Digital Forensics, Vol. 7, No. 1, 2015.

Clifton, Chris and Kantarcioglu, Murat and Vaidya, Jaideep and Lin, Xiaodong and Zhu, Michael Y, "Tools for privacy preserving distributed data mining," ACM Sigkdd Explorations Newsletter, vol. 4, no. 2, pp. 28-34, 2002.

Goethals, Bart and Laur, Sven and Lipmaa, Helger and Mielikäinen, Taneli, "On private scalar product computation for privacy-preserving data mining," in International Conference on Information Security and Cryptology, 2004.

Atallah M J, Du W, "Secure multiparty computational geometry," in Proc. the 7th International Workshop on Algorithms, 2011.

Yang B, Sun A D, Zhang W Z, "Secure two-party protocols on planar circles," Journal of Information & Computational, vol. 8, no. 1, pp. 29-40, 2011.

Babak Siabi, Mehdi Berenjkoub, Willy Susilo, "Optimally Efficient Secure Scalar Product With Applications in Cloud Computing," IEEE Access, vol. 7, no. 1, pp. 42798 - 42815, 29 3 2019.

Zhang J, Li L, Tang Y, Luo S, Yang Y, Xin Y, "Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform," PLoS One, Public Library of Science, vol. 14, no. 1, pp. 1-22, 2019.

Y. Rahulamathavan, S. Dogan, X. Shi, R. Lu, M. Rajarajan and A. Kondoz, "Scalar Product Lattice Computation for Efficient Privacy-preserving Systems," IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1417-1427, 2021.

Mehnaz, Shagufta and Bellala, Gowtham and Bertino, Elisa, "A secure sum protocol and its application to privacy-preserving multi-party analytics," in Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017.

Duy-Hien, Vu and The-Dung, Luong and Tu-Bao, Ho, "An Efficient Approach for Secure Multi-party Computation without Authenticated Channel," Information Science, 2019.

The-Dung, Luong and Tu-Bao, Ho, "Privacy preserving frequency mining in 2-part fully distributed setting," IEICE TRANSACTIONS on Information and Systems, vol. 93, no. 10, pp. 2702-2708, 2010.

Thi Van Vu, The Dung Luong, Van Quan Hoang, "An Elliptic Curve-based Protocol for Privacy Preserving Frequency Computation in 2-Part Fully Distributed Setting," in 12th International Conference on Knowledge and Systems Engineering (KSE), Can Tho, 2020.

Luong The Dung, Vu Duy Hien, Vu Thi Van, "A new Approach for secure multi-party computation protocol," Journal of Military Science and Technology, vol. Information security special, 2019.

Downloads

Published

2022-01-13

How to Cite

Van, V. T., Dung, L. T., Quan, H. V., & Luong, T. T. . (2022). An efficient secure sum of multi-scalar products protocol base on elliptic curve. Journal of Science and Technology on Information Security, 2(14), 18-25. https://doi.org/10.54654/isj.v14i2.196

Issue

Section

Papers