Verifiable private multi-party computation: Ranging and ranking

@article{Zhang2013VerifiablePM,
  title={Verifiable private multi-party computation: Ranging and ranking},
  author={L. Zhang and X. Li and Y. Liu and T. Jung},
  journal={2013 Proceedings IEEE INFOCOM},
  year={2013},
  pages={605-609}
}
  • L. Zhang, X. Li, +1 author T. Jung
  • Published 2013
  • Computer Science
  • 2013 Proceedings IEEE INFOCOM
  • The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work… CONTINUE READING
    40 Citations

    Tables and Topics from this paper

    Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
    • T. Jung, X. Li, M. Wan
    • Computer Science
    • IEEE Transactions on Dependable and Secure Computing
    • 2015
    • 79
    • PDF
    Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
    • Q. Zheng, Shouhuai Xu
    • Computer Science
    • 2015 IEEE International Conference on Cloud Engineering
    • 2015
    • 29
    • PDF
    Infinite Choices of Data Aggregations with Linear Number of Keys
    • 2
    Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
    • 114
    • PDF
    Secure Multi-party Comparison Protocol and Application
    • 1
    Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
    • 56
    Privacy-Preserving Verifiable Incentive Mechanism for Crowdsourcing Market Applications
    • 4
    • PDF
    Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks
    • 50
    • PDF
    A General Framework for Privacy-Preserving Distributed Greedy Algorithm
    • 3
    • PDF

    References

    SHOWING 1-10 OF 22 REFERENCES
    Efficient Private Matching and Set Intersection
    • 1,090
    • PDF
    Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
    • 114
    • PDF
    Distributed Private Matching and Set Operations
    • 60
    Efficient Privacy-Preserving k-Nearest Neighbor Search
    • Yinian Qi, M. Atallah
    • Computer Science
    • 2008 The 28th International Conference on Distributed Computing Systems
    • 2008
    • 95
    Privacy preserving cloud data access with multi-authorities
    • 146
    • PDF
    FindU: Privacy-preserving personal profile matching in mobile social networks
    • 229
    • PDF
    Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks
    • B. Sheng, Q. Li
    • Computer Science
    • IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
    • 2008
    • 152
    • PDF