Private Multi-party Matrix Multiplication and Trust Computations

07/13/2016
by   Jean-Guillaume Dumas, et al.
0

This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/02/2022

Sparse matrix multiplication in the low-bandwidth model

We study matrix multiplication in the low-bandwidth model: There are n c...
research
11/25/2022

Secure Distributed Gram Matrix Multiplication

The Gram matrix of a matrix A is defined as AA^T (or A^TA). Computing th...
research
02/07/2022

Analog Secure Distributed Matrix Multiplication over Complex Numbers

This work considers the problem of distributing matrix multiplication ov...
research
06/25/2019

On the Upload versus Download Cost for Secure and Private Matrix Multiplication

In this paper, we study the problem of secure and private distributed ma...
research
08/12/2021

Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound

Consider the problem of designing secure and private codes for distribut...
research
10/30/2018

Rate-Efficiency and Straggler-Robustness through Partition in Distributed Two-Sided Secure Matrix Computation

Computationally efficient matrix multiplication is a fundamental require...
research
11/20/2019

Fast Actively Secure OT Extension for Short Secrets

Oblivious Transfer (OT) is one of the most fundamental cryptographic pri...

Please sign up or login with your details

Forgot password? Click here to reset