On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol

09/22/2018
by   Babak Siabi, et al.
0

In this paper we discuss the security of a distributed inner product (DIP) protocol [IEEE TIFS, 11(1), (2016), 59-73]. We show information leakage in this protocol that does not happen in an ideal execution of DIP functionality. In some scenarios, this information leakage enables one of the parties to completely learn the other party's input. We will give examples of such scenarios.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2021

Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice

Secure Multi-Party Computation (SMPC) allows a set of parties to securel...
research
06/13/2022

Constant-Round Linear-Broadcast Secure Computation with Penalties

It is known that Bitcoin enables achieving fairness in secure computatio...
research
06/09/2023

McFIL: Model Counting Functionality-Inherent Leakage

Protecting the confidentiality of private data and using it for useful c...
research
05/03/2021

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

Consider a PPT two-party protocol π=(A,B) in which the parties get no pr...
research
04/11/2020

Secure protocol to protect location privacy in distance calculation

Several applications require computing distances between different peopl...
research
03/17/2020

Comment on "Quantum key agreement protocol"

The first two party Quantum Key Agreement (QKA) protocol, based on quant...
research
07/25/2023

A Comprehensive Analysis on the Leakage of Fuzzy Matchers

This paper provides a comprehensive analysis of information leakage duri...

Please sign up or login with your details

Forgot password? Click here to reset