Private feasible solution determination
Abstract Applying secure multi‐party computation (SMC) to implement secure linear programming is an important problem of SMC. Private feasible solution determination means that one of the participants has a private value and the other participants have some constraints, and they want to cooperativel...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | IET Information Security |
Online Access: | https://doi.org/10.1049/ise2.12003 |
id |
doaj-a8bca94d70e345d0bf5d97d91aa4dfd1 |
---|---|
record_format |
Article |
spelling |
doaj-a8bca94d70e345d0bf5d97d91aa4dfd12021-07-14T13:25:19ZengWileyIET Information Security1751-87091751-87172021-01-01151768610.1049/ise2.12003Private feasible solution determinationXue Ge0Jiawei Dou1Wenli Wang2Yingnan Wang3School of Mathematics and Information Science Shaanxi Normal University Xi'an ChinaSchool of Mathematics and Information Science Shaanxi Normal University Xi'an ChinaSchool of Computer Science Shaanxi Normal University Xi'an ChinaSchool of Mathematics and Information Science Shaanxi Normal University Xi'an ChinaAbstract Applying secure multi‐party computation (SMC) to implement secure linear programming is an important problem of SMC. Private feasible solution determination means that one of the participants has a private value and the other participants have some constraints, and they want to cooperatively determine whether the private value satisfies the constraints without disclosing their private information. This problem has important theoretical and practical significance in both scientific research and practice. In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. Furthermore, threshold decryption elliptic curve cryptosystem is used to privately determine a feasible solution with multiple constraints for two‐party and multi‐party scenarios. The efficiency analysis shows that the protocols developed in this study are simple and efficient. Finally, the authors also show how to use these protocols to solve other SMC problems.https://doi.org/10.1049/ise2.12003 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xue Ge Jiawei Dou Wenli Wang Yingnan Wang |
spellingShingle |
Xue Ge Jiawei Dou Wenli Wang Yingnan Wang Private feasible solution determination IET Information Security |
author_facet |
Xue Ge Jiawei Dou Wenli Wang Yingnan Wang |
author_sort |
Xue Ge |
title |
Private feasible solution determination |
title_short |
Private feasible solution determination |
title_full |
Private feasible solution determination |
title_fullStr |
Private feasible solution determination |
title_full_unstemmed |
Private feasible solution determination |
title_sort |
private feasible solution determination |
publisher |
Wiley |
series |
IET Information Security |
issn |
1751-8709 1751-8717 |
publishDate |
2021-01-01 |
description |
Abstract Applying secure multi‐party computation (SMC) to implement secure linear programming is an important problem of SMC. Private feasible solution determination means that one of the participants has a private value and the other participants have some constraints, and they want to cooperatively determine whether the private value satisfies the constraints without disclosing their private information. This problem has important theoretical and practical significance in both scientific research and practice. In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. Furthermore, threshold decryption elliptic curve cryptosystem is used to privately determine a feasible solution with multiple constraints for two‐party and multi‐party scenarios. The efficiency analysis shows that the protocols developed in this study are simple and efficient. Finally, the authors also show how to use these protocols to solve other SMC problems. |
url |
https://doi.org/10.1049/ise2.12003 |
work_keys_str_mv |
AT xuege privatefeasiblesolutiondetermination AT jiaweidou privatefeasiblesolutiondetermination AT wenliwang privatefeasiblesolutiondetermination AT yingnanwang privatefeasiblesolutiondetermination |
_version_ |
1721302835867418624 |