DeepAI AI Chat
Log In Sign Up

On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol

09/22/2018
by   Babak Siabi, et al.
Isfahan University of Technology
0

In this paper we discuss the security of a distributed inner product (DIP) protocol [IEEE TIFS, 11(1), (2016), 59-73]. We show information leakage in this protocol that does not happen in an ideal execution of DIP functionality. In some scenarios, this information leakage enables one of the parties to completely learn the other party's input. We will give examples of such scenarios.

READ FULL TEXT

page 1

page 2

page 3

page 4

11/03/2021

Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice

Secure Multi-Party Computation (SMPC) allows a set of parties to securel...
06/13/2022

Constant-Round Linear-Broadcast Secure Computation with Penalties

It is known that Bitcoin enables achieving fairness in secure computatio...
05/03/2021

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

Consider a PPT two-party protocol π=(A,B) in which the parties get no pr...
03/17/2020

Comment on "Quantum key agreement protocol"

The first two party Quantum Key Agreement (QKA) protocol, based on quant...
04/11/2020

Secure protocol to protect location privacy in distance calculation

Several applications require computing distances between different peopl...
11/29/2017

Inner Product and Set Disjointness: Beyond Logarithmically Many Parties

A basic goal in complexity theory is to understand the communication com...
05/17/2018

Supersingular Isogeny Oblivious Transfer

We present an oblivious transfer (OT) protocol that combines the OT sche...