Secure Computation on Additive Shares

by   Zhihua Xia, et al.

The rapid development of cloud computing has probably benefited each of us. However, the privacy risks brought by untrusty cloud servers arise the attention of more and more people and legislatures. In the last two decades, plenty of works seek the way of outsourcing various specific tasks while ensuring the security of private data. Although the addition and multiplication are enough for implementing any functions, the direct utilization of existing schemes like homomorphic encryption will lead to significant efficiency and accuracy loss, which is not suitable for outsourcing computation tasks. The tasks to be outsourced are endless, however, the involved calculations are similar. In this paper, inspired by additive secret sharing and multiplicative secret sharing technologies, we construct a series of novel protocols which support the common secure calculations on numbers (e.g., basic elementary functions) or matrices (e.g., solve eigenvectors) in arbitrary n number of servers (n ≥ 2), and the n-party protocols ensure the security of the original data even if n-1 servers collude. All protocols we designed only need constant interaction rounds, and we demonstrate them under universally composability security. We believe that these protocols can provide a new basic tool for actual outsourced tasks.



There are no comments yet.


page 13


Efficient Privacy-Preserving Computation Based on Additive Secret Sharing

The emergence of cloud computing provides a new computing paradigm for u...

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing

The rapid growth of digital images motivates individuals and organizatio...

Secret Sharing for Cloud Data Security

Cloud computing helps reduce costs, increase business agility and deploy...

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications

As one of the most important basic operations, matrix multiplication com...

Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases

This paper proposes Prism, a secret sharing based approach to compute pr...

FMPC: Secure Multiparty Computation from Fourier Series and Parseval's Identity

FMPC is a novel multiparty computation protocol of arithmetic circuits b...

Privacy and Data Balkanization: Circumventing the Barriers

The rapid growth in digital data forms the basis for a wide range of new...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.