Efficient Privacy-Preserving Computation Based on Additive Secret Sharing

09/11/2020
by   Lizhi Xiong, et al.
0

The emergence of cloud computing provides a new computing paradigm for users—massive and complex computing tasks can be outsourced to cloud servers. However, the privacy issues also follow. Fully homomorphic encryption shows great potential in privacy-preserving computation, yet it is not ready for practice. At present, secure multiparty computation (MPC) remains the mainly approach to deal with sensitive data. In this paper, following the secret sharing based MPC paradigm, we propose a secure 2-party computation scheme, in which cloud servers can securely evaluate functions with high efficiency. We first propose the multiplicative secret sharing (MSS) based on typical additive secret sharing (ASS). Then, we design protocols to switch shared secret between MSS and ASS, based on which a series of protocols for comparison and nearly all of elementary functions are proposed. We prove that all the proposed protocols are Universally Composable secure in the honest-but-curious model. Finally, we will show the remarkble progress of our protocols on both communication efficiency and functionality completeness.

READ FULL TEXT
research
09/28/2020

Secure Computation on Additive Shares

The rapid development of cloud computing has probably benefited each of ...
research
10/05/2022

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning

The overhead of non-linear functions dominates the performance of the se...
research
04/27/2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data – Full Version

Despite exciting progress on cryptography, secure and efficient query pr...
research
02/17/2021

ppAUC: Privacy Preserving Area Under the Curve with Secure 3-Party Computation

Computing an AUC as a performance measure to compare the quality of diff...
research
08/17/2023

Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration

Unmanned aerial vehicles (UAVs) are commonly used for edge collaborative...
research
01/06/2021

HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System

We propose HERMES, a scalable, secure, and privacy-enhancing system, whi...
research
09/15/2020

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing

The rapid growth of digital images motivates individuals and organizatio...

Please sign up or login with your details

Forgot password? Click here to reset