DocumentCode :
1928146
Title :
Secure Similarity Coefficients Computation with Malicious Adversaries
Author :
Zhang, Bo ; Zhang, Fangguo
Author_Institution :
Sch. of Inf. Sci. & Technol., Sun Yat-sen Univ., Guangzhou, China
fYear :
2012
fDate :
19-21 Sept. 2012
Firstpage :
303
Lastpage :
310
Abstract :
Similarity coefficients play an important role in many application aspects. Recently, a privacy-preserving similarity coefficients protocol for binary data was proposed by Wong and Kim (Computers and Mathematics with Application 2012). In this paper, we show that their protocol is not secure, even in the semi-honest model, since the client can retrieve the input of the server without deviating from the protocol. Also we propose a secure similarity coefficients computation in the presence of malicious adversaries, and prove it using the standard simulation-based security definitions for secure two-party computation. We also discuss several extensions of our protocol for settling other problems. Technical tools in our protocol include zero-knowledge proofs and distributed ElG amal encryption.
Keywords :
data privacy; binary data; distributed ElGamal encryption; malicious adversaries; privacy-preserving similarity coefficients protocol; simulation-based security definitions; zero-knowledge proofs; Computational modeling; Encryption; Power capacitors; Protocols; Public key; Distributed ElG amal encryption; Malicious adversary; Secure two-party computation; Similarity coefficients; Zero-knowledge proof;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference on
Conference_Location :
Bucharest
Print_ISBN :
978-1-4673-2279-9
Type :
conf
DOI :
10.1109/iNCoS.2012.36
Filename :
6337935
Link To Document :
بازگشت